googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 1, 2025
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 215B

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 215A

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

  • Wednesday, April 2, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Lake Norman & Charlotte IT Professionals Joint Meeting (open to all attendees):
    • session level icon
    The Journey to 'Happily Ever After' in Cybersecurity
    speaker photo
    Director, Infrastructure & Security, National Gypsum
    speaker photo
    Former Global CISO, Albemarle Corporation
    speaker photo
    CISO, OneMain Financial
    speaker photo
    SVP, Enterprise Business/CIO, Centene Corporation
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    The concept of achieving a state of “Happily Ever After” in cybersecurity presents both a tantalizing goal and a formidable challenge — even moreso in today’s rapidly changing environment of technologies and regulations. This panel brings together industry leaders to explore critical questions defining the cybersecurity landscape today.

    Panelist discuss how organizations can define their ideal endpoint in cybersecurity — whether it’s a static goal or a dynamic process of continuous improvement. As organizations embark on their cybersecurity journeys, prioritizing investments is crucial. Panelists offer guidance on identifying critical initiatives and allocating resources effectively.

    Join us for an engaging discussion that promises to illuminate the path toward a secure and resilient future in cybersecurity.

     

     

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Harnessing the Strengths of Neurodiversity in Cybersecurity
    • session level icon
    speaker photo
    VP, Information Security, Centene Corporation
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Neurodiversity. What is it, what are the traits, and why are people with these traits attracted to the cybersecurity fields?

    Rick Doten has managed technical cybersecurity staff for more than 25 years. He’s observed how we have special skills and abilities to perform the work we do; things like identifying patterns, spotting anomalies, learning new information quickly, troubleshooting, and being able to hyperfocus on a tasks until they’re resolved. Rick highlights how some traits help you naturally be good at some cybersecurity roles.

    This has been a special interest of Rick’s for the last couple years, and he have taken dozens of hours of clinical training to become a certified clinical specialist in Autism and ADHD. He discusses topics such as executive functions, which are the cognitive skills that regulate emotions, impulse control, attention, time management and others, how to manage focus and distractions, and what motivates people.

    He’ll talk about accommodating these executive functions, how to better gain motivation and focus, and even how people with neurodiversity can be better in interviews.

    Rick provides techniques, tools, and even apps to help people with neurodiversity be more productive and successful. He lists apps and life hacks to help initiate tasks, manage time, working memory, and reduce procrastination.

    Rick’s goal is to celebrate how it’s okay that we are different, because the cybersecurity community is a tribe of neurodivergent people who accept, support, and encourage each other.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Navigating the Evolving U.S. Cybersecurity Regulatory Landscape
    • session level icon
    speaker photo
    Partner, Hall Booth Smith, P.C.
    speaker photo
    Sr. Director, Cybersecurity Compliance, Ally Financial
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    With an increasing number of cyber threats targeting critical infrastructure, supply chains, and enterprises, the U.S. regulatory landscape is rapidly shifting. From SEC cybersecurity disclosure rules to CISA incident reporting mandates, state-level data privacy laws, and evolving industry-specific compliance requirements, organizations must stay ahead of a complex and ever-changing regulatory environment.

    This session will provide a comprehensive domestic outlook on the most significant cybersecurity regulations impacting businesses today. Attendees will gain insights into:

    • Key federal and state-level cybersecurity regulations shaping enterprise security strategy.
    • The latest updates from regulatory bodies such as CISA, SEC, FTC, and NIST.
    • How enforcement trends and compliance expectations are evolving.
    • Practical strategies for CISOs and security leaders to align with new requirements while maintaining operational agility.

    Join this session to better understand where cybersecurity regulations are headed, how to prepare, and what’s next for compliance and enforcement in the United States.

     

    10:15 am
    Guardians of Growth: Securing M&As to Protect the Realm
    • session level icon
    speaker photo
    VP, CISO, Enpro
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    In a cybersecurity organization far far away, the stakes are higher than ever when it comes to inorganic growth through mergers and acquisitions (M&A). As organizations embark on their growth journeys, they must navigate a realm fraught with cyber threats that can jeopardize their success. This talk delves into the critical role of cybersecurity in safeguarding these pivotal transactions.  Join us as we explore the unique challenges and vulnerabilities that arise during M&A activities. From due diligence to post-merger integration, we will uncover the strategies and best practices that cybersecurity professionals must employ to defend against potential breaches and ensure a seamless transition.

    10:15 am
    Backup Is Not Equal to Cyber Resilience
    • session level icon
    speaker photo
    Field CTO, Americas, Rubrik
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 220BC

    As organizations face the growing threat of ransomware and data exfiltration, many are reevaluating their preparedness for a large-scale data loss event. The problem is that legacy backup systems, which were designed to protect against hardware failure or natural disasters, are now being targeted by cybercriminals as their first point of attack. In this session, we will discuss why traditional backup systems and cyber recovery solutions are fundamentally different capabilities. We will also explore the steps that organizations can take to prepare for and recover from a cyber-attack, including implementing a modern cyber recovery tool.

    10:15 am
    From Defense to Dominance: Redesigning Cyber Resilience for Today's World
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 220A

    Cyber resilience isn’t just about surviving attacks—it’s about designing systems that prevent, detect, and recover with speed and precision. In an era where both physical and digital security must work in harmony, organizations need to rethink their approach to cybersecurity, ensuring they are prepared, proactive, and adaptive in the face of evolving threats.

    This session explores how modern cybersecurity solutions are transforming resilience, covering:

    • Prevention – The antidote to anxiety is preparation. Learn how proactive cybersecurity strategies mitigate risks before they become disasters.
    • Detection – A Security Operations Center (SOC) is your always-on digital guardian, continuously refining security posture and responding to threats in real-time.
    • Recovery – Aligning strategy with action is critical. Discover how integrated recovery strategies enable organizations to bounce back in minutes—not hours or days.

    Join us for an insightful, action-driven discussion on how to build a future-proof cybersecurity framework that keeps your business ahead of the attackers, ensuring security, continuity, and confidence.

    10:15 am
    Advisory Council Roundtable Discussion (VIP / Invite only)
    • session level icon
    Securing the Modern Factory: Eliminating Cyber Threats with Zero Trust Architecture
    speaker photo
    Sr. Director of OT, Zscaler
    Registration Level:
    • session level iconVIP / Exclusive
    10:15 am - 11:00 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Generously sponsored by:

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Locking the Future: Why Data Security Is the Key to Trustworthy AI
    • session level icon
    speaker photo
    Data Strategy and Data Information Architect, Bank of America
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

    11:10 am
    Trials and Tribulations: The Ups and Downs of Migrating a Legacy Enterprise to the Cloud in Under 24 Months
    • session level icon
    speaker photo
    Deputy CISO, Allspring Global Investments
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    This session discusses the ups and downs of migrating a set of middle and back-office applications from Wells Fargo Asset Management data centers entirely to the AWS and Azure cloud. This included moving over a thousand users from Wells Fargo offices to new workspaces while also building a new infosec team from the ground up. Over 400 legacy applications were migrated along with new IAM, network security, and monitoring architectures. Hear not just the incredible challenges but the opportunities to update legacy elements while still moving quickly. While an overwhelming task fraught with risk, a large-scale cloud migration can also be a once-in-a-career opportunity to build a security foundation the right way.

    11:10 am
    Transforming Application and Service Delivery for the Modern Environment
    • session level icon
    speaker photo
    Sales Engineering, Island
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.

    In this session, we will discuss:

    How the Enterprise Browser revolutionizes workspaces by balancing productivity, security, availability, and user experience.
    How quickly this new technology can be adopted to provide a competitive advantage
    Strategies for reducing the effort required to deliver applications and enhance organizational operations.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Sr. Director of Systems Engineering, ExtraHop
    speaker photo
    Enterprise Systems Engineer, Veeam
    speaker photo
    Sr. Channel Sales Engineer, Thales
    speaker photo
    VP, Information Security, Essent Guaranty, Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] How CISOs Can Elevate Influence and Become a Business Driver
    • session level icon
    speaker photo
    CISO, ChenMed
    speaker photo
    CISO, Belk
    speaker photo
    Former SVP & CSO / CISO, American Tire Distributors
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    For today’s CISOs, it’s no longer enough to be just technical experts. This panel of top-level cybersecurity breaks away from talking about the tired mantra of “speaking the language of the business” and instead dives into practical, real-world examples of how security leaders have successfully navigated the business landscape.

    The discussion focuses on actionable strategies and tactics that have helped CISOs gain influence, secure funding, and elevate cybersecurity from a technical function to a critical business driver. Walk away with specific metrics, communication techniques, and actionable insights that have been proven to work in the real world—offering practical takeaways that can be implemented immediately. Get ready for a session that goes beyond the theory and delivers tangible answers to the challenges CISOs face today.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Building Business Resilience: Protecting Your Critical Identity Infrastructure
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

     

    This interactive session will focus on methods for protecting hybrid Active Directory (AD) environments and the challenges organizations face in maintaining the integrity of their identity infrastructures.

    Many organizations depend on AD and Entra ID (formerly known as Azure AD) to ensure their Zero Trust strategies. If AD goes down, nearly every other system and resource in the data center is at risk. This session will expose the vulnerabilities associated with AD and Entra ID, highlight the difficulties of recovering these services to a trustworthy state after a cyberattack, and encourage participants to reflect on – and share – their own infrastructure’s resilience.

    Join this engaging discussion and contribute your insights and practical strategies for CISOs like you who want to enhance their organization’s resilience.

    Generously supported by:

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    The Unbreakable Chain: Securing Supply Lines Against Cyber Attacks
    • session level icon
    speaker photo
    Founder, Armstrong Risk Management LLC
    speaker photo
    Information Security Executive - Global Supply Chain, Lenovo
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Though most organizations have an increased budget for securing internal systems, in recent years there has been an increased dependency on third parties – suppliers/vendors or partners to deliver products and services across various industries. Given the current threat landscape and increase in supply chain attacks across industries, there is a need for addressing business resiliency.

    The session uncovers:

    • Various types of supply chain attacks
    • Recent trends and causes
    • Mechanisms to assess and address supply chain risk
    • Recommendations for building a resilient supply chain
    1:15 pm
    AI Systems Under Siege: From Adversarial Attacks to Post-Quantum Defense Strategies
    • session level icon
    speaker photo
    Executive Partner of Innovation, AiSuNe
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Session spoiler: The adversaries are already digging the siege tunnel. Future IT systems will increasingly rely on AI as one of their core components. In an environment of omnipresent, available devices of all sizes and the increasing challenge of data encryption through quantum computing, we must harden secure build processes and communication. We are used to the idea that AI protects us, but how do we protect AI? Our presentation explores some of these challenges and their countermeasures.

    We examine how AI systems create new attack surfaces and security risks. The discussion then shifts to Generative AI and the future of autonomy with Agentic AI. We analyze how their decision-making capabilities and physical world interactions introduce unprecedented risks if not appropriately secured. Finally, we address how quantum computing threatens current cryptographic protections and present post-quantum cryptography as a vital defense strategy for securing AI systems in the quantum era.

    1:15 pm
    The Cyber Villain’s Playbook: Exploiting Access Control & Privilege Escalation
    • session level icon
    speaker photo
    vCISO, Lead Cybersecurity Consultant, Risk Advisory Services, AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Every great cybersecurity breach starts with a story — an entry point, a misstep, and a villain looking to exploit vulnerabilities. In this session, we’ll take you on a journey through the dark side of access control, where attackers weave their own narrative of exploitation. Through a live demonstration, we’ll show how a simple website vulnerability can set the stage for a full-scale privilege escalation, ultimately allowing an attacker to gain root privileges and take complete control of the server.

    Join us as we unravel this modern cyber fairytale, revealing how attackers gain initial access, identify privilege escalation flaws, and ultimately seize control. Learn how to rewrite the ending — one where security teams stay ahead of the adversary and turn the tide in the fight for cybersecurity resilience.

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Senior Director of Product Management, Cyberhaven
    speaker photo
    Chief Information Security Architect, Netskope
    speaker photo
    Chief Security Technologist, CDW
    speaker photo
    Sr. Product Marketing Manager, Cato Networks
    speaker photo
    Director, Infrastructure & Security, National Gypsum
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    SOC Essentials: Assembling Your First Response Team
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin International
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    The Security Operations Center (SOC) is an organization’s first eyes and ears to security threats and risks. For the SOC to support being an organization’s first response team, the team must have the proper resources for continuous growth and monitoring to keep an organization secure. This discussion focuses on key foundational elements for developing and maturing a SOC. Attendees will learn how to establish processes, procedures, and data-driven growth plans for their SOC .

    2:10 pm
    Predatory AI
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    The risks of predatory AI are multifaceted and include both real-world and hypothetical scenarios. One significant concern is the potential for AI to be used in predatory behavior, such as the manipulation of the technical and human behavior element through the exploitation of both types of vulnerabilities. For instance, AI algorithms can predict personal characteristics of users based on simple interactions such as “liking” content on social media platforms, which can then be used to manipulate behaviors. Couple that with the technological aspects and you have a potential worst-case scenario.

    This presentation examines the types of AI services promoted as services and the links of those services back to Dark AI. From there, learn how to mitigate these risks through various security solutions for your company and personal interactions.

    2:10 pm
    Firewall Cleanup 101: Eliminating Security Gaps in Your Firewall Configuration
    • session level icon
    speaker photo
    Lead Information Security Engineer, TIAA
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    It is common for firewall rule bases to become large and convoluted over time, especially for organizations on their zero-trust journey. A complicated rule base is difficult to maintain, impacts firewall performance, and creates large security gaps. This session dives into:

    • The scope: What exactly should you be cleaning up on your firewalls?
    • The process: What tools should you empower to help keep your firewall configuration secure and simple?
    • Automation: How can you streamline and automate firewall cleanup?
    • Business value: How do you use this information to tell a story to your business leaders/partners?

     

    2:10 pm
    Dynamic Distributed Cloud Security
    • session level icon
    speaker photo
    Global CTO & VP, Commvault
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Session details to come.

    2:55 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:55 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [Closing Keynote] Securing the Queen City and Beyond: Lessons in Leadership from Charlotte’s Top CISOs
    • session level icon
    speaker photo
    CISO, Baker Tilly US
    speaker photo
    SVP & Chief Security Officer, Duke Energy Corporation
    speaker photo
    Corporate VP & Global CISO, Lowe's Companies, Inc.
    speaker photo
    VP & Global CISO, Hanesbrands Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    The role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, Charlotte’s top CISOs come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the region’s largest and most influential organizations.

    This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to close the conference on a high note.

    4:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

Exhibitors
  • Abnormal Security
    Booth: TBD

    Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
    Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

    Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

  • AccessIT Group
    Booth: 300

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Axonius
    Booth: 300

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Binalyze
    Booth: 240

    Binalyze is an innovator in Investigation and Response Automation. With evidence collected, our Timeline, Triage, and Drone features help you to collaborate and complete incident response investigations quickly and dramatically reduce dwell time. AIR saves you time, reduces cybersecurity operational costs, and helps you prevent the financial and reputational losses associated with cyber attacks.

  • Black Duck
    Booth: 260

    Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.

  • C1
    Booth: TBD

    C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Cato Networks
    Booth: 445

    Cato Networks pioneered the convergence of networking and security into the cloud. Aligned with Gartner’s Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks, Cato’s vision is to deliver a next generation secure network architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Our cloud-native architecture enables Cato to rapidly deploy new capabilities and maintain optimum security posture, without any effort from the IT teams. With Cato, your IT organization and your business are ready for whatever comes next. For more information, visit https://www.catonetworks.com.

  • CDW
    Booth: 450

    CDW Corporation is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada. A Fortune 500 company and member of the S&P 500 Index, CDW helps its customers to navigate an increasingly complex IT market and maximize return on their technology investments. For more information about CDW, please visit  www.CDW.com.

    Our broad array of products and services range from hardware and software to integrated IT solutions such as security, cloud, hybrid infrastructure and digital experience.

  • Charlotte IT Professionals
    Booth: TBD

    We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.

  • Charlotte Metro ISC2
    Booth: TBD

    The Charlotte Metro ISC2 chapter is a 501c3 non-profit organization, whose mission is to advance information security in the local communities throughout the Charlotte Metro area. We provide our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate. We are committed to engaging in public service activities and outreach to advance cybersecurity awareness in the broader community.

  • Charlotte Metro ISSA
    Booth: TBD

    The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.

  • Check Point Software Technologies
    Booth: 300

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cloud Security Alliance Charlotte Chapter
    Booth: TBD

    CSA chapter membership allows opportunities for continued learning, security awareness, networking, and career growth.

    • Network with peers and subject matter experts
    • Gain valuable insight from industry professionals and peers
    • Build cloud security awareness at the community level
    • Participate in cloud security education and training locally
    • Participate in CSA research and development
    • Discuss cloud vulnerabilities and brainstorm solutions
    • Be a leader in the cloud security field
    • Member discounts on training and exams
  • Clutch Security
    Booth: 265

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises.

    As digital infrastructures expand and become more complex, the management and security of non-human identities—ranging from API keys and secrets to tokens and service accounts—have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities.

    Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations.

  • Commvault
    Booth: 325

    Commvault (NASDAQ: CVLT) is the gold standard in cyber resilience, helping more than 100,000 organizations to uncover, take action, and rapidly recover from cyber attacks—keeping data safe and businesses resilient and moving forward. Today, Commvault offers the only cyber resilience platform that combines the best data security and rapid recovery at enterprise scale across any workload, anywhere with advanced AI-driven automation—at the lowest TCO.

  • Contrast Security
    Booth: 300

    Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.

  • Cribl
    Booth: TBD

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • CyberArk Software
    Booth: 300

    CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

  • Cyberbit
    Booth: TBD

    Cyberbit was founded in 2015 to address an acute issue: Cybersecurity teams are not prepared to deal with cyberattacks. Conventional training forces teams to learn on the job with no clear measurement of progress and very real repercussions. With disproportionally large investments into cybersecurity tools, cybersecurity teams lack the knowledge, skills, and experience to effectively deploy their toolsets, leading to a continued increase in breaches, regardless of technology investments.

    To address this issue, Cyberbit developed the first-ever hyper-realistic cyber skilling platform, ensuring that cybersecurity professionals have the right knowledge, skills, and experience to excel. The Cyberbit Skills Development platform includes cyber labs, commercial tool training (Splunk, Palo Alto Networks, Checkpoint, Carbon Black & more) with attacker context, and live-fire cyber range exercises aligned to industry best standards (NICE Framework, MITRE ATT&CK, NIST) to ensure your team develops into top-tier cybersecurity professionals. Performance-based assessment using advanced network sensors validate your team’s skills giving you the confidence that your digital assets are fully protected. Cyberbit contains the world’s largest catalog of on-demand simulated attacks including Ransomware, DDoS, SQL Injections, Worms, Fileless Attacks, and more.

    Cyberbit is used by leading organizations around the world including Fortune 500 organizations, MSSPs, governments, and academic institutions to transform their cyber practitioners into elite cyber defenders. Organizations use Cyberbit to create a better SOC team by upskilling their cyber professionals, validating incoming candidate skillsets, rapidly onboarding new hires, and validating incident response playbooks. Cyberbit delivers over now million hours of training annually across 5 continents.

  • Cyberhaven
    Booth: 540

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cyera
    Booth: 300

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Cymulate
    Booth: TBD

    Cymulate SaaS-based continuous security validation makes it simple to measure and improve your security posture across the full attack kill-chain. Every assessment is scored and includes actionable remediation guidance to mitigate risk and optimize security control effectiveness. Cymulate enables you to take data-driven decisions and manage your security resources efficiently.

  • Expel
    Booth: 300

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • ExtraHop
    Booth: TBD

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • Gigamon
    Booth: 300

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • Google Cloud
    Booth: 420

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • HackerOne
    Booth: TBD

    HackerOne is the #1 hacker-powered security platform. More than 1,400 organizations, including the U.S. Department of Defense, General Motors, Google Play, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Starbucks, and Dropbox, trust HackerOne to find critical software vulnerabilities.

  • ISACA Charlotte
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

  • Island
    Booth: 360

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • Lake Norman IT Professionals
    Booth: TBD

    Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!

  • Netskope
    Booth: 415

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Phish Club
    Booth: TBD

    Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.

    Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!

  • Optiv
    Booth: 520

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Rubrik
    Booth: 455

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • Saviynt
    Booth: 435TBD

    Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience.

  • Semperis
    Booth: 545

    Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

  • SIM Charlotte
    Booth: TBD

    The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:

    • Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
    • Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
    • Challenging our comfort levels by exchanging ideas with peers and business counterparts.
    • Being a resource for each other, and personal networking.
  • Sumo Logic
    Booth: TBD

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Tenable
    Booth: 530

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • Tevora
    Booth: 245

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Thales
    Booth: 300

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: 255

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Veeam Software
    Booth: TBD

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • WiCyS North Carolina Affiliate
    Booth: TBD
  • ZeroFox
    Booth: TBD

    Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.

    Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.

  • Zscaler
    Booth: 425

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Mike Brannon
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Henry Capello
    Former Global CISO, Albemarle Corporation
  • speaker photo
    Jane Domboski
    CISO, OneMain Financial

    Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. She is both an attorney and cybersecurity practitioner, having served in the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime, cyber terrorism, and cyber espionage as an FBI Agent for more than 20 years. Her private sector experience includes running the global Cyber Operations for SC Johnson and Cyber Strategy, Governance, and Compliance for Deloitte Global.

  • speaker photo
    Jamiee Robles
    SVP, Enterprise Business/CIO, Centene Corporation
  • speaker photo
    Rick Doten
    VP, Information Security, Centene Corporation

    Rick is VP of Information Security at Centene Corporation and CISO of the Medicaid healthplan based in Charlotte, NC.

    In his prior role, Rick worked as Virtual CISO supporting international companies. During that time Rick educated corporate boards, developed and matured security programs, and created the curriculum for a Cybersecurity Master’s degree program for an International University.

    Rick is a frequent speaker at cybersecurity conferences such as RSA, Secureworld, Bsides, and FutureCon, and guest on numerous cybersecurity podcasts, including The CyberWire Hashtable, CISO Series, Google Cloud, Elevate Your Career, and The Rsnake Show. Rick talks about topics ranging from cybersecurity and risk, to neurodiversity, leadership, and staffing.

    He on the Cloud Security Alliance (CSA) CXO Trust Advisory Council, and the Boards of his local Charlotte ISC2 and CSA Chapters. He works with several Venture Capital and go-to-market firms reviewing security technology, as well as on the Board of Advisors for several startups.

    Rick is on the CIS Critical Security Controls editorial panel and was a lead author on Version 8 of the Controls. He was also on the committee to update Cloud Security Alliance CCSK v5 study guide. Rick has a Cybersecurity YouTube channel where he has videos on the 18 CIS CSC v8 Controls, and other videos on cybersecurity topics.

    Rick has alternated between being a cybersecurity management consultant and CISO throughout his 27+ year cybersecurity career, and has led ethical hacking, incident response and forensics, and risk management teams.

  • speaker photo
    Richard Sheinis
    Partner, Hall Booth Smith, P.C.

    Richard Sheinis has litigated in federal and state courts for 37 years and has been the first
    chair for approximately 175 jury trials. His clients have included health care professionals and
    institutions, technology companies, and global business entities.

    Rich takes advantage of his litigation background to work with businesses in the areas of
    data privacy and cybersecurity, employment, and technology. He works with a wide variety
    of companies from small technology businesses to publicly traded companies with a global
    footprint.

    Rich also teaches Health Information Privacy and Security as an adjunct professor at the
    University of North Carolina at Charlotte.

  • speaker photo
    Josh Brown
    Sr. Director, Cybersecurity Compliance, Ally Financial

    Josh Brown is currently the Senior Director of Cybersecurity Compliance at Ally Financial with an oversight role for cyber-threat related compliance activities as well as effective challenge and oversight of Ally’s cybersecurity threat posture. He joined Ally with his background in working broadly across the financial services sector and other industries in areas of application security, threat intelligence, business continuity, government regulation, risk assessments and vulnerability management processes.

    Josh is based in Charlotte, NC with his wife, three children, chickens, dogs, cats, frogs, fish and lizards. He greatly enjoys opportunities to mentor cybersecurity professionals in their career objectives (which he often does through Charlotte’s Phish Club). In his spare time he enjoys unsuccessful attempts at growing fields of beans and corn. He holds a master’s degree in Information Assurance from Norwich University and holds certifications from ISC2 and ISACA.

  • speaker photo
    Frank DePaola
    VP, CISO, Enpro

    Frank is an accomplished security and risk management leader with more than 23 years of experience, including 12 years leading global security & infrastructure teams for enterprise organizations. Frank has a passion for designing and implementing effective cybersecurity programs at enterprise scale in diverse environments. Frank specializes in greenfield security program development, accelerating information security program transformations (fixer uppers), and driving complex merger & acquisition integrations and divestitures for large organizations. Frank currently serves as Enpro’s first CISO, responsible for building and maturing all aspects of Enpro’s information security and regulatory compliance programs globally. Prior to Enpro, Frank held roles in the areas of security operations, security architecture & engineering, strategy, threat & vulnerability management, and regulatory compliance (HIPAA, PCI, FFIEC, DFARS) for organizations including GE, Humana, and Applebee's (franchisee). Frank is a US Army veteran who volunteers his time through mentorship, advising cyber startups, and serving on advisory boards.

  • speaker photo
    Jason Cook
    Field CTO, Americas, Rubrik

    Jason brings over 25 years of experience in information systems and technology. He’s held a variety of roles and responsibilities in disciplines ranging from sales to consulting to project management. Jason’s true passion is engaging with clients, both current and prospective, as well as partners and industry personas in fact-based dialogues to the betterment of the IT community. In addition, delivering premium customer experiences and technology solutions through thought leadership, passion, and expertise. Jason has been with Rubrik for 8 years and is based in Nashville, TN.

  • speaker photo
    C1 Representative
  • speaker photo
    Deepak Patel, Moderator
    Sr. Director of OT, Zscaler
  • speaker photo
    Jennifer Fite
    Data Strategy and Data Information Architect, Bank of America

    Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.

  • speaker photo
    Michael Martin
    Deputy CISO, Allspring Global Investments

    Michael has worked in almost every level of information technology, starting in networking and network security in the late 1990s. He has provided security and infrastructure knowledge to companies in the high-tech, financial services, and manufacturing fields as well as professional development and dev-ops. Most recently he helped develop and deploy a biometric security wearable to most of the top pharmaceutical manufacturers in the world before being enticed back into financial services by the possibility of migrating a legacy enterprise to the cloud.

  • speaker photo
    Matt Pour
    Sales Engineering, Island

    Matt Pour leads Island's North America Sales Engineers. Matt brings decades of Information Technology and Information Security experience from establishing ITIL practices and InfoSec programs in Fortune 500 companies to engineering/architecting InfoSec business challenges for customers of some of the world's leading technology and cybersecurity companies. Matt was previously a Field CTO at Broadcom and help technical leadership roles at Symantec, Blue Coat and IBM.

  • speaker photo
    Reese D'Herckens
    Sr. Director of Systems Engineering, ExtraHop

    Reese D'Herckens is the Senior Director of Systems Engineering at ExtraHop, an IT security and analytics company. Reese is a long-time member of the ExtraHop team and leads the Systems Engineering team for the Americas, drawing on his 26 years of experience in IT. Reese has worked at large enterprise companies, such as The New York Stock Exchange and T.D. Securities, as well as a Chicago based high-frequency proprietary trading firm.

  • speaker photo
    Julian Salinas
    Enterprise Systems Engineer, Veeam

    Julian Salinas is a seasoned Systems Engineer with extensive experience in data protection strategies, cloud initiatives, and datacenter consulting. Currently, he serves at Veeam, as a Enterprise Systems Engineer engaging with customers on Data Protection and Data resiliency as a trusted advisor in their journey. With Julian's expertise in Virtualization, Cloud, Business Continuity and Disaster Recovery, this has allowed him to give an end-to-end perspective on the tech landscape. Julian’s IT career consists of 25 years of experience with companies including, IBM, VCE, DellEMC, VMware and Veeam.

  • speaker photo
    Jamie Southerland
    Sr. Channel Sales Engineer, Thales

    With over 20 years of technical experience, Jamie is a seasoned Senior Channel Sales Engineer specializing in application and data security solutions. Combining deep technical expertise with a strong understanding of channel sales strategies, Jamie is an invaluable asset to both customers and partners in the cybersecurity landscape.

    Jamie’s career spans multiple industries, including a background in energy utilities, where they managed datacenter security and operations. This hands-on experience provides them with a unique perspective on the challenges organizations face in securing applications and sensitive data. Their expertise in implementing robust security frameworks has helped businesses safeguard digital assets from evolving threats.
    In their current role, Jamie excels in cultivating relationships with channel partners, driving sales growth, and providing technical guidance on cutting-edge security solutions. Passionate about empowering businesses, they leverage innovative technologies and best practices to help organizations protect their applications and data in an ever-changing security landscape.

  • speaker photo
    James Keegan, Moderator
    VP, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Janet Heins
    CISO, ChenMed
  • speaker photo
    Neda Pitt
    CISO, Belk
  • speaker photo
    Kimberly Trapani
    Former SVP & CSO / CISO, American Tire Distributors
  • speaker photo
    Jim Doggett, Moderator
    CISO, Semperis

    James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.

  • speaker photo
    Justin Armstrong
    Founder, Armstrong Risk Management LLC

    Justin Armstrong is a security, privacy, and regulatory compliance consultant with over 25 years of experience in the Healthcare Industry. He worked as a vCISO at FractionalCISO, managed security at Healthcare Cybersecurity startup Tausight, and led Product Security at MEDITECH, a top three Electronic Health Record vendor. He has engaged with Hospitals in nearly 100 ransomware incidents.

    Recently he founded Armstrong Risk Management to provide guidance on security, privacy, and regulatory compliance to companies large and small.

    He holds the CISSP and HCISPP certifications and obtained his Masters in Cybersecurity Leadership at Brandeis University.

  • speaker photo
    Sue Thomas
    Information Security Executive - Global Supply Chain, Lenovo

    Sue Thomas is a Global Technology & Cybersecurity Executive with over 25 years of experience across semiconductors, finance and technology industries and specializes in Infrastructure, Security, Technology Risk, Governance, regulatory compliance , business resiliency & Data Privacy. Sue worked as Deputy CISO for Analog Devices, Director of IT Audit for financial institutions, Head of IT for KMG Chemicals and currently leads Global Supply Chain Information Security at Lenovo.

    Sue dedicated her career to build and lead programs to transform IT and enhance operational resiliency, while leveraging cybersecurity as a strategic asset and implementing innovative initiatives that create value and drive revenue growth.

    Sue holds an Executive MBA, master's in computer science, along with certifications in CISSP, CRISC, CISA, CMMC-RP, CSPO & PMP, which have equipped her with a deep expertise in security, risk, and governance.

  • speaker photo
    Wolfgang Rohde
    Executive Partner of Innovation, AiSuNe

    Dr. Rohde, a pioneer in applying cutting-edge technologies, co-founded IBM’s Web Services and SOA Excellence Team for Europe. He later developed Cloud solutions for an international solution provider. As global Director of Research at Siemens Digital, he focused on AI, GenAI, Blockchain, Cybersecurity, and Autonomous Factories in manufacturing and supply chain. Currently, as Executive Director at AiSuNe Foundation, Dr. Rohde bridges innovative research with practical business solutions.

  • speaker photo
    Brett Price
    vCISO, Lead Cybersecurity Consultant, Risk Advisory Services, AccessIT Group

    Brett Price is a Lead Cybersecurity Consultant for the Risk Advisory
    Services practice at AccessIT Group (AITG). Brett’s Cybersecurity journey
    spans over two decades in the mid to large Enterprise space, where he
    seamlessly transitioned from systems administrator and network architect
    roles into esteemed cybersecurity leadership positions. His tenure in the IT
    and cybersecurity realms has equipped him with not only technical acumen
    but has molded him into a strategic visionary. Through his deep-rooted
    understanding of business risk and governance frameworks such as NIST,
    ISO/IEC 27001/27005, COBIT, and CISv8, Brett has sculpted cybersecurity
    narratives for enterprises, always placing an emphasis on confidentiality,
    integrity, and assurance.

  • speaker photo
    Ben Crocker
    Senior Director of Product Management, Cyberhaven
  • speaker photo
    Rehman Khan
    Chief Information Security Architect, Netskope

    Rehman is the Head of Security Architecture & Engineering - Chief Information Security Architect at Netskope. Prior to joining Netskope, he led Security Architecture and Infrastructure Engineering teams at Financial Services, Biotechnology and Hospitality organizations.

    Rehman is a frequent speaker at industry conferences, including presentations at RSA on cloud security strategy. He specializes in building holistic security programs, with deep expertise in cloud security, data protection, identity management, and decision sciences. Rehman is an adjunct professor at Washington University in St. Louis, he has authored and taught graduate-level courses on access control, identity management, and zero trust security.

    At Netskope, Rehman leads the security architecture and engineering function to build innovative security solutions that balance business agility with robust data protection and compliance. He thrives on staying ahead of the latest technology trends and building future-proof systems to withstand emerging threats.

  • speaker photo
    Jeremiah Salzberg
    Chief Security Technologist, CDW

    Jeremiah Salzberg is a security leader with over 25 years of security leadership experience in the financial, telecommunications, and manufacturing sectors. He has held security positions responsible for engineering and architecture, pen testing and incident response, as well as numerous CISO-level positions. In his role as chief security technologist for CDW, Jeremiah is charged with evaluating current and emerging security technologies to ensure that clients are able to effectively address their cybersecurity challenges, and take a forward-leaning approach to prevention, detection and response. He also engages with CDW clients to discuss their security strategies and speaks at conferences.

  • speaker photo
    Philip Walley
    Sr. Product Marketing Manager, Cato Networks

    Philip Walley is a Senior Product Marketing Manager at Cato Networks, where he focuses on showcasing the transformative potential of Cato’s single-vendor SASE platform. With over 20 years of experience in IT and technology marketing, he has developed a strong understanding of how converged networking and security solutions can empower organizations to navigate today’s complex digital landscape. At Cato, Philip’s work is centered around helping enterprises simplify their IT infrastructures and achieve secure, high-performance connectivity. Drawing on his deep expertise in SASE, SSE, and SD-WAN, he strives to craft clear, impactful narratives that resonate with IT leaders looking for innovative solutions to modern challenges. Based in Nashville, Tennessee, Philip holds a Master’s in Information Security and Assurance from Western Governors University. His passion lies in connecting technology to meaningful business outcomes, enabling teams to work smarter and more securely.

  • speaker photo
    Mike Brannon, Moderator
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin International

    Reanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.

    Throughout her career, Reanna has worn many hats, including roles in Endpoint Security Engineering, Detection Engineering, and leading a Security Operations Center (SOC) team. In addition to her primary responsibilities, Reanna serves as an adjunct professor at the University of Central Missouri (UCM) and is also an entrepreneur.

    Reanna is the founder of CyberSpeak Labs, a platform dedicated to fostering community engagement through collaboration. She hosts the podcast Defenders in Lab Coats, where she delves into cyber threats and occasionally invites passionate guests to share their insights.
    Driven by her passion for cybersecurity, Reanna frequently travels to speak at events, sharing her industry knowledge and empowering others to improve their organizations' cybersecurity practices.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Tarik Haniff
    Lead Information Security Engineer, TIAA

    Tarik Haniff is currently a Senior Cybersecurity Engineer at TIAA, specializing in Network Security, Cloud Security, Endpoint Security, and Identity and Access Management. Prior to TIAA, he was a Senior Cybersecurity Engineer at SAS Institute, the world’s largest privately held software company, where he specialized in Microsoft Azure Security. He holds a Bachelor’s Degree in Computer Science and a Master’s Degree in Cybersecurity both from The University of North Carolina at Charlotte. He also holds certifications from AWS, Azure, Palo Alto Networks, and Zscaler. He has six years of experience in the cybersecurity industry.

  • speaker photo
    Brian Brockway
    Global CTO & VP, Commvault
  • speaker photo
    Amy Bogac
    CISO, Baker Tilly US

    Amy Bogac was most recently the CISO and Vice President of Enterprise Security and Infrastructure at The Clorox Company. With a passion for securing great brands, Amy previously led the Global Information Security and Infrastructure department for CF Industries, was the Director of IT Security Operations for the Walgreen Company, a member of Walgreens Boots Alliance, and was also a founding member of the IT Security Department at the Kellogg Company. Amy holds an MBA from Lake Forest Graduate School of Management, a BA from St. Xavier University, and achieved her CISSP from ISC2 more than 10 years ago.

  • speaker photo
    Martin Strasburger
    SVP & Chief Security Officer, Duke Energy Corporation

    Martin Strasburger leads the Enterprise Security department at Duke Energy Corporation, a
    Fortune 200 company, and one of the largest combined gas and electric utilities in the United
    States. In this role, Martin works with company executives and the board of directors to define
    the company’s security strategy across technology networks/systems, operational assets,
    facilities and personnel. To implement the strategy Martin leads a team of 250 highly skilled
    employees across all security disciplines.

    Prior to joining Duke Energy Corporation, Martin was a Senior Director leading the
    cybersecurity department at Pacific Gas and Electric Company, also a Fortune 200 company,
    and one of the largest combined gas and electric utilities in the United States. In this role,
    Martin built an industry leading security intelligence and operations center and significantly
    increased the maturity of the overall cybersecurity program. Martin started his career in
    Deloitte’s Security and Privacy Services practice. At Deloitte, Martin was a Senior Manager and
    served Fortune 100 companies such as Citi, United Technologies, and JP Morgan Chase.
    Additionally, Martin was a practice leader for the Identity and Access Management practice.
    Martin has extensive experience in identity and access management, vulnerability
    management, threat intelligence and security operations. He holds the CISSP designation.

    Martin has a bachelor's degree in Management Information Systems from California State
    University Chico.

  • speaker photo
    Marc Varner
    Corporate VP & Global CISO, Lowe's Companies, Inc.

    As vice president, chief information security officer, Marc Varner is responsible for the global security strategy and program, ensuring all Lowe’s information assets and technologies are properly protected. He collaborates with senior technology and business leaders to implement the best security practices to protect and serve our customers and overall business. He joined Lowe’s in 2021.

    Marc has over 25 years of experience in technology and has expertise in global cybersecurity strategy, security architecture and process, information security governance and controls and regulatory compliance. Prior to Lowe's, he served as vice president and global chief information security officer at Yum! Brands, where he was responsible for global cybersecurity and strategic cybersecurity planning. He previously served as vice president and global chief information security officer at McDonald’s.

    Marc is on the advisory board of a number of leading cybersecurity companies and serves as a global chair for the Cyber Security Collaborative, which he co-founded in 2012.

  • speaker photo
    John Opala, PhD, Moderator
    VP & Global CISO, Hanesbrands Inc.

    Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.

    Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.

    In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
    Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
    Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.

    Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.

  • speaker photo
    Happy Hour
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes