Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 22, 20259:00 am[PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmAI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.
Lesson 1: What is Artificial Intelligence?
Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.Lesson 2: What are the AI threats?
Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.Lesson 3: What are the AI vulnerabilities?
Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.Lesson 4: What are AI security controls?
Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.Lesson 5: What is AI risk management?
Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data CardsLesson 7: What are the AI governance, AI compliance, AI audit requirements?
Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.Lesson 8: Building an AI security program
Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursCyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, October 23, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityCISO & VP of Infrastructure Services, Carter’s, Inc.Registration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive fireside chat, two seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead. Expect candid insights on topics like:
- The toughest decisions CISOs face daily
- Emerging threats and how security leaders are preparing
- The future of security operations, compliance, and resilience
- Strategies for bridging the gap between security teams and executive leadership
- Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.
9:45 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
10:15 amBalancing Security and Operations in Building Control SystemsNational Practice Lead – Building Cybersecurity, Michael Baker InternationalRegistration Level:Conference Pass
10:15 am - 10:50 amBuilding control systems are increasingly targeted in today’s threat landscape—but the bigger danger may lie in how IT and OT teams respond. In this engaging session, Fred shares lessons from a career that began in IT and shifted to building control system security after a wake-up call while supporting WarnerMedia global operations. Through real-world case studies—like a vulnerability scan that knocked 6,000 devices offline—Fred illustrates the hidden risks of misaligned IT/OT priorities.
Attendees will explore how to implement right-sized security measures that safeguard building systems without disrupting critical operations. Key themes include risk assessment, the limitations of traditional IT tools in OT environments, and the enduring power of curiosity as a primary attack vector.
10:15 amTabletop Exercises: The Fun KindRegistration Level:Conference Pass
10:15 am - 10:50 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
10:15 am[Panel] The Sorcerer's Apprentice: Taming AI in CybersecuritySenior Director, Vulnerability Management, Application Security and Control Monitoring, Cox CommunicationsRegistration Level:Open Sessions
10:15 am - 10:50 amAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
10:50 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:Open Sessions
10:50 am - 11:10 amLocation / Room: Exhibitor HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amTracking the Massive Changes to Privacy Laws in the U.S.Registration Level:Conference Pass
11:10 am - 11:45 amSession description to come.
11:10 amCyber Risk by the Numbers from a Cyber Insurance PerspectiveRegistration Level:Conference Pass
11:10 am - 11:45 amYou’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceRegistration Level:Open Sessions
11:10 am - 11:45 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Cyber Stars™: Celebrating Excellence in Atlanta's Cybersecurity CommunityFounder & Managing Director, Class-LLC™PHR, Sr. Human Resources LeaderManaging Director, Healthcare Cybersecurity, RSM US LLPIndependent Cybersecurity Consultant & Strategic AdvisorSr. Application Security Architect, Tempus AIHead of Customer Excellence - Identity, GuidePoint SecurityRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe ISSA Metro Atlanta Chapter has partnered with SecureWorld to honor the city’s brightest cybersecurity professionals at the Cyber Stars™ Awards ceremony. This event celebrates excellence across five key categories, recognizing individuals at various stages of their careers:
-
Blazing Stars (Security Leaders)
-
Brilliant Stars (Senior-Level Professionals)
-
Shining Stars (Mid-Career Professionals)
-
Rising Stars (Entry-Level Professionals)
-
Emerging Stars (Pre-Professional/Students)
These awards shine a spotlight on the extraordinary contributions of cybersecurity leaders within the Metro Atlanta area. Nominees and winners, selected by an independent panel of judges, represent the best of our field. Don’t miss the opportunity to celebrate these remarkable individuals who are helping to shape the future of cybersecurity!12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmThe Psychology of Phishing: Designing Human‑Centered Awareness ProgramsGRC Officer, Georgia Tech Research InstituteRegistration Level:Conference Pass
1:15 pm - 1:50 pmPhishing is still the most common attack method because it taps into natural human biases. In this session, we’ll break down the key psychological triggers—like authority, urgency, and social proof—that make these attacks work.
You’ll learn how to build awareness programs that actually connect with employees by focusing on what motivates real behavior. We’ll walk through a practical framework for designing empathy-based simulations, tracking behavior change over time, and improving your training based on what works.
You’ll walk away with a proven, psychology-based blueprint and ready-to-use templates to build phishing awareness programs that cut click rates by over 30% in just three months.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:Conference Pass
1:15 pm - 1:50 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pm[Panel] Proactive Security: Building Digital Fortresses Against Modern DragonsGlobal Field CISO, CohesityCybersecurity Engineering Lead, PaypalRegistration Level:Open Sessions
1:15 pm - 1:50 pmIn the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.
This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.
Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.
1:50 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:Open Sessions
1:50 pm - 2:10 pmLocation / Room: Exhibitor HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pm[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsCybersecurity Director, GFTRegistration Level:Conference Pass
2:10 pm - 2:45 pmThis panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
2:10 pmZero Trust for Generative AI: Securing the Next Frontier of Enterprise IntelligencePrincipal Security Architect, ADPRegistration Level:Conference Pass
2:10 pm - 2:45 pmExplore how Zero Trust security principles are evolving to protect against emerging threats in the era of Generative AI. This session will delve into real-world risks, including prompt injection, data leakage, and shadow AI, while showcasing how organizations can apply Zero Trust principles to secure AI models, data, and users. Learn practical strategies, industry case studies, and best practices to build AI-resilient infrastructure. Ideal for cybersecurity leaders, IT professionals, and AI practitioners aiming to future-proof their security posture.
2:10 pmSocial Engineering: Training the Human FirewallRegistration Level:Open Sessions
2:10 pm - 2:45 pmPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:Open Sessions
2:45 pm - 3:00 pmLocation / Room: Exhibitor HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Beyond Prevention: Building Cyber Resilience Through RecoveryVP, Channel & Sales Enablement, 11:11 SystemsRegistration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterOrganizations invest heavily in prevention, but in today’s threat landscape it’s not a matter of if an attack will succeed, but when. The true differentiator between victims and survivors is the ability to recover quickly, cleanly, and confidently.In our presentation, we will discuss:- Why recovery is as critical as prevention, including the business and reputational costs of downtime.
- Ways to improve your cyber resilience with these key components—immutability, disaster recovery as a service (DRaaS), clean room environments, and validation.
- How to build a cyber recovery strategy that integrates people, process, technology, and clear communication.
Ultimately, resilience is about more than surviving an attack—it’s about sustaining trust, continuity, and confidence in an unpredictable world.3:45 pmHappy Hour & Dash for PrizesRegistration Level:Open Sessions
3:45 pm - 4:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

- 11:11 SystemsBooth: TBD
11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.
- Cloud Security Alliance (CSA)Booth: TBD
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
- Cohesity, IncBooth: TBD
We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.
- CyberhavenBooth: TBD
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- Cyversity Atlanta ChapterBooth: TBD
Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.
- InfraGard Atlanta Members AllianceBooth: TBD
InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. Businesses, individuals involved in the protection and resilience of the U.S. critical Infrastructure and the Federal Bureau of Investigation.
InfraGard National Members Alliance (INMA), which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together.
IAMA is the Atlanta chapter of InfraGard. It is a local association of persons who represent businesses, academic institutions, state and local law enforcement agencies, non-profit organizations and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.
- ISACA AtlantaBooth: TBD
The aim of the ISACA Atlanta Chapter is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help further promote and elevate the visibility of the IT audit, risk, control and security professions throughout the local area.
Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology.
- ISC2 AtlantaBooth: TBD
ISC2 Atlanta chapter encompasses the Atlanta Metro area. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.
Our mission is to advance information security in local communities throughout Atlanta, Georgia, by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.
- ISSA Metro Atlanta ChapterBooth: TBD
The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.
- Red Canary, a Zscaler companyBooth: TBD
Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLC
Rob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program and other cyber risk services offered by CRO.
Rob graduated with honors from Washington State University with a Bachelors in Management Information Systems and went on to work for a local tech startup in the greater Seattle area. Before joining CRO, Rob interned at a local cyber testing facility based in Bellevue, Washington, and gained his first exposure to the fast-paced world of cybersecurity. His interest in cybersecurity has only increased as the cyber landscape continues to evolve. He looks forward to helping companies manage these constantly changing risks. Outside of work, Rob enjoys exploring the amazing state of Washington with his family.
- Kemper SeayCISO & VP of Infrastructure Services, Carter’s, Inc.
Kemper Seay is a strategic technology executive with over 25 years of experience driving cybersecurity, ecommerce, and IT transformation across enterprise environments. As Chief Information Security Officer and Vice President of Infrastructure at Carter’s, Inc., she leads global cybersecurity strategy, cloud modernization, and IT operations, managing a team of 100+ professionals. Kemper previously built Carter’s ecommerce business from the ground up, growing it to over $400 million in annual sales. She is a recipient of the 2024 Women in Technology “Woman of the Year” award and a Georgia CISO ORBIE finalist. An advocate for STEM and youth leadership, she serves on multiple advisory boards and is a mentor for FIRST Robotics. Kemper is a candidate for the NACD Directorship Certification and holds a B.S. in Psychology.
- Panel Discussion
- Fred GordyNational Practice Lead – Building Cybersecurity, Michael Baker International
Fred Gordy is the National Practice Lead, Building Cybersecurity at Michael Baker International. In this role, Fred spearheads cybersecurity strategies for operational technology systems (like HVAC, BAS, and lighting) across a wide range of facilities. With over two decades of experience in control systems security, Fred is a recognized thought leader in smart building cybersecurity. His leadership in advancing secure building operations and industry best practices earned him the prestigious Julie Devine Digital Impact Award in 2025. Fred’s work continues to shape cybersecurity standards and protect critical building infrastructure.
- Panel Discussion
- Jacob Prosser, ModeratorSenior Director, Vulnerability Management, Application Security and Control Monitoring, Cox Communications
Jacob Prosser is a seasoned cybersecurity professional with more than 14 years of experience in the field. As a Director of Cyber Defense at Cox Communications, he and his team play a critical role in keeping the company and its customers safe from cyber threats. His expertise spans various domains within cybersecurity including application security, identity and access management, security architecture, detection engineering, and incident response.
Jacob graduated from the University of Georgia with a degree in Management Information Systems, and he holds a CISSP certification.
- Panel Discussion
- Keyaan Williams, EmceeFounder & Managing Director, Class-LLC™
An MBA and JMT Certified Team Member, Keyaan followed a unique path to becoming a risk leader. The story begins with service in the U.S. Army as chemical weapons specialist. Later, he worked in communications security for the Army Reserve Command Headquarters. Then, he spent more than a decade in various IT and security roles at the Centers for Disease Control and Prevention (CDC) in Atlanta.
CLASS-LLC was founded with a vision to help global customers benefit from strategy, governance, and program management lessons learned throughout his career. Beyond security, Keyaan is known for his service as the Past President of ISSA International, Chair of the risk committee for a global ministry, and Founding Member of the Private Directors Association Atlanta Chapter.
- Shelley Greenhalgh, JudgePHR, Sr. Human Resources Leader
Now happily retired and enjoying the next chapter, Shelley Greenhalgh spent her career as a dynamic human resources leader, working for global and Fortune 150 companies to build stronger, more people-focused organizations. She’s best known for her ability to connect the dots between business strategy and talent—especially in fast-paced technology environments.
Over the years, Shelley worked side-by-side with CTOs and senior execs to shape cultures where people could truly thrive. She played a key role in designing tech-focused compensation strategies and career pathing programs—tools that helped companies not just attract top talent, but keep them growing and engaged for the long haul.
Along the way, she picked up a few credentials (because learning is kind of her thing). Shelley holds certification from SHRM, NTL certification in Organizational Development, certified mediator in the state of Georgia, and an Affirmative Action certification from Cornell University. These days, she’s traded boardrooms and conference rooms for good times with friends, but her passion for people, culture, and growth still shows up in everything she does.
- Lenny Levy, JudgeManaging Director, Healthcare Cybersecurity, RSM US LLP
Mr. Levy brings years of experience helping organizations address cybersecurity challenges. Prior to making the transition to Chief Information Security Officer (CISO) for healthcare organizations, he consulted on cybersecurity topics for organizations around the world based in the United States and Singapore. Now Mr. Levy leads RSM’s North America healthcare cybersecurity practice working with clients to reduce risk associated with emerging threats, regulatory compliance, data loss, and AI governance.
He holds a Bachelor of Science in Decision and Information Sciences from the University of Florida and a Master of Business Administration (MBA) from Duke University Fuqua School of Business. He holds Certified Information Systems Security Professional (CISSP) and Certified Information Systems Auditor (CISA) certifications.
- Hiten Patel, JudgeIndependent Cybersecurity Consultant & Strategic Advisor
Hiten is an independent cybersecurity consultant and strategic advisor with more than 20 years of experience advising Fortune 500 organizations and their executive leadership teams to build business-aligned security programs that drive organizational resilience. Specializing in executive advisory services for CISOs and C-suite leaders, he combines deep technical expertise with strategic business acumen to translate cybersecurity investments into measurable business outcomes. Hiten excels at bridging the gap between complex security requirements and business objectives across regulated industries.
His current consultancy focuses on cybersecurity strategy development and CISO advisory services, drawing from his extensive background leading enterprise risk management and compliance programs spanning various cyber and privacy frameworks at Accenture, EY, and PwC, where he served clients across global markets. Having directed transformational security initiatives, he brings proven expertise in scaling security programs and developing governance frameworks that enable digital transformation while maintaining robust security controls across financial services, retail, healthcare, and manufacturing sectors.
- Damien Suggs, JudgeSr. Application Security Architect, Tempus AI
Damien is a recognized leader in the Atlanta area. He is an OWASP Advocate and Threat Modelling Specialist with over twenty-three years of experience. He has worked in various industry verticals and a wide range of IT Security disciplines.
Damien has been directly involved with penetration testing and ethical hacking of networks, applications, mobile applications, IoT devices, and cloud computing environments. He specializes in implementing all aspects of an application security program, including creating policies, processes, and procedures that govern the implementation of security practices into the fabric of the organization and company culture. - Mark Whitesell, JudgeHead of Customer Excellence - Identity, GuidePoint Security
Mark Whitesell has been in the IT Security space for over 30 years. Mark has held leadership positions at RSA Security, Okta and Saviynt; and is widely considered an expert in identity management and governance space. Mark sits on the Advisory Board for ISSA Metro Atlanta, in addition to several other identity companies. Mark is a graduate of Georgia Tech and lives in the Atlanta area with his wife and four children.
- Emmanuel NwajiakuGRC Officer, Georgia Tech Research Institute
Emmanuel Nwajiaku is a GRC Officer at Georgia Tech Research Institute and an Instructor. He holds CISSP, Security+, and Network+ certifications, along with a Secret clearance. Emmanuel focuses on AI-enhanced security policies and human-centered defense strategies. He has led awareness programs that reduced phishing click rates by 30% and teaches these approaches in both corporate and academic settings.
- Dr. Joye Purser, CISSPGlobal Field CISO, Cohesity
Dr. Joye Purser is Global Field CISO at Cohesity, the number-one maker of data backup systems. She also is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.
In 2022, she was the first-ever senior executive Regional Director for Cybersecurity in CISA Region 4, for the U.S. Department of Homeland Security. At CISA, the Cybersecurity and Infrastructure Security Agency, Dr. Purser delivered strategic vision for a geographically distributed team of security experts and strengthened partnerships with critical infrastructure owners in the region. Prior to that, Dr. Purser worked in the private sector at a large, global management consulting firm, where she facilitated enterprise risk management and business continuity activities for a 10,000-staff client. She led global pandemic recovery operations, enabling a county of 4.7 million people to organize, plan, and expend more than $400 million in COVID relief aid.
Working for 20 years in Washington, Dr. Purser was selected to serve in the White House at the Office of Management and Budget (OMB), where she oversaw development of the $95 billion Department of Defense technology budget. While at OMB, she led an effort that galvanized federal agencies, the private sector, and Congress to unify to secure and strengthen the semiconductor supply chain.
Dr. Purser led audit activities at the Pentagon for a decade, advising on the design and deployment of multi-billion-dollar IT programs such as financial management systems and electronic health records. A governance, risk, and compliance expert, she authored internal policies establishing new authorities for the Director of Cost Assessment and Program Evaluation (OSD/CAPE) for an agency with a two-million-person workforce.
Before that, Dr. Purser worked on Capitol Hill as a seasoned legislative staffer, guiding the agenda for two members of Congress on the House Science Committee. There, she steered the House Diversity and Innovation Caucus; drafted a bill promoting a more diverse technology workforce that passed into law; organized constituent town hall events; worked on a presidential campaign; and contributed to the drafting of the Affordable Care Act.
Earlier in her career, Dr. Purser has consulted on federal engagement strategy as Vice President of Artemis Strategies; and she worked at the nonprofit, Research America, to educate scientists on how to engage with Congress more effectively and in their communities. She serves on the Board of Cyversity; mentors a large group of security professionals; and devotes her gifts of communication, strategy, and coalition-building in a number of volunteer activities in her community.
A graduate of Georgia Tech, Dr. Purser has a technical background as an accomplished researcher. Her first scientific publication has been cited more than three hundred times. She resides in Atlanta with her spouse and children.
- Chamon Gayton, ModeratorCybersecurity Engineering Lead, Paypal
Chamon Gayton is a highly motivated and accomplished cybersecurity professional and retired military veteran, bringing over 17 years of proven experience in security operations, governance, risk and compliance (GRC), and information assurance within both federal and private sector environments. Specializing in leading enterprise-wide security initiatives, Chamon has a distinguished record of successfully guiding organizations through complex compliance and security challenges, with deep expertise in federal frameworks including FISMA, FedRAMP, StateRAMP, NIST (800-53, 800-53A, 800-18, 800-60), FIPS 199 & 200, and DoD standards.
Throughout her career, Chamon has demonstrated a consistent ability to build and lead high-performing cybersecurity teams, while developing cross-functional programs from initial planning through implementation — mitigating risk, ensuring compliance, and delivering strong internal and customer-facing outcomes. Her leadership style emphasizes strategic collaboration, continuous improvement, and mission-focused execution.
With a sharp analytical mindset and strong data analysis capabilities, Chamon excels at identifying and addressing security vulnerabilities, synthesizing large datasets to drive decision-making, and enhancing long-term security postures. She has successfully performed and overseen numerous security assessments, audits, and readiness reviews, ensuring adherence to critical state, federal, and industry regulations.
Drawing on her military discipline and leadership acumen, Chamon is known for her ability to mentor emerging security professionals, establish trusted relationships across technical and executive teams, and cultivate a security-first culture. Her hands-on approach and clear communication style make her a valuable contributor to any initiative aimed at elevating security maturity and resilience.
Chamon holds multiple industry certifications and continues to stay at the forefront of evolving cyber threats, emerging regulations, and risk management strategies. Whether advising senior leadership or leading tactical execution, she brings both vision and operational excellence to every engagement.
- Panel Discussion
- Tamika Bass, ModeratorCybersecurity Director, GFT
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.
- Sanat PattanaikPrincipal Security Architect, ADP
Sanat is a senior cybersecurity leader with a proven track record of building and scaling enterprise security programs that align with business strategy and enable digital transformation. With deep expertise in Zero Trust, cloud security, and the NIST Cybersecurity Framework, he has successfully led cross-functional teams to secure AI-driven architectures and address emerging risks. A strong advocate of security-by-design, Sanat combines technical acumen with strategic vision to help organizations navigate the evolving landscape of Generative AI securely. As a trusted advisor to executives and boards, he emphasizes embedding security as a business enabler in the AI era.
- Jack BaileyVP, Channel & Sales Enablement, 11:11 Systems
Jack Bailey is the Vice President of Sales & Channel Enablement at 11:11 Systems. He is a driven IT sales and learning professional with demonstrated success in management, solving customer challenges and sales enablement. He oversees the alignment of advanced networking protocols, virtualization architecture, and multi-vendor/protocol support of production, testing, and disaster recovery solutions to customer challenges.
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
