Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, March 17, 2026
    9:00 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage
    • session level icon
    speaker photo
    Associate Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Your CEO just asked about AI security. Do you have an answer?
    While you’re counting vulnerabilities, your competitors are deploying AI at scale.
    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
    And your cybersecurity team? Still writing policies nobody reads.
    In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
    You’ll master:
    •  The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    •  Executive Translation — Turn technical AI risks into boardroom language
    •  NIST AI RMF Implementation — Practical application, not theory
    •  The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    •  Shadow AI Discovery — Find and govern the AI already in your organization
    •  Business-First Security — Protect value, not just systems
    Who should attend:
    Perfect fit:
    •  CISOs facing board questions about AI
    •  Information Security Directors enabling digital transformation
    •  IT VPs without dedicated security teams
    •  Cybersecurity Consultants serving enterprise clients
    •  Risk Managers governing AI initiatives
    •  Aspiring decision makers and those reporting to one
    Wrong course:
    •  Developers wanting to code AI models
    •  Analysts seeking technical certifications
    •  Anyone looking for hands-on hacking labs
    This workshop is NOT about:
    •  Prompt injection techniques
    •  Model architecture security
    •  Technical vulnerability scanning
    •  Writing 200-page policies
    This workshop IS about:
    •  Speaking profit-and-loss to executives
    •  Enabling your AI transformations
    •  Building cybersecurity into AI from day one
    •  Becoming the trusted AI advisor
    You’ll leave with:
    1. The Complete AIR-MAP Toolkit
    •  90-day implementation roadmap
    •  Discovery templates and workflows
    •  Risk scoring calculators
    •  Executive presentation templates
    2. Ready-to-Deploy Policies
    •  AI Acceptable Use Policy (customize in minutes)
    •  Vendor assessment questionnaires
    •  Incident Response playbooks
    3. 30-Minute Strategy Session
    Complementary private consultation to apply AIR-MAP to your specific situation.
  • Wednesday, March 18, 2026
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    speaker photo
    Director, Infrastructure & Security, National Gypsum
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Simple Daily Habits to Strengthen Your Security Posture
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Session details to come.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    Focus Areas: Security Leadership; Executive Alignment; Career Development
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    Continue the Conversation with Opening Keynote Speaker Dr. Cole
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall
    Want to know more about why Dr. Eric Cole thinks the old CISO model is broken? Or how to be a better manager, leader, or team player? Or do you just want to chat more with the good doctor after his motivating keynote? Either way, come join this bonus session in the Networking Lounge immediately after his opening keynote.
    10:15 am
    [Panel] Who Are You? A Quick Look at Identity with Regard to Cybersecurity
    • session level icon
    Focus Areas: Identity & Access Management (IAM); Authentication and Authorization; Zero Trust
    speaker photo
    Chief of Staff, Cyber and Third-Party Tech Risk Team, AT&T
    speaker photo
    Identity and Access Management – Risks, Issues, Controls and Governance, AT&T
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    During this session, we will dig into how and why access is controlled, what is the difference between authentication and authorization, is MFA and 2FA the same thing, what is RBAC, and why some people and organizations call Identity Management the “first line of defense in cybersecurity.”
    10:15 am
    Identity Security Beyond MFA: Continuous Verification and Risk-Based Controls
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Session details to come.

    10:15 am
    [Panel] Bridging the Gap: The Role of the BISO in Modern Cybersecurity
    • session level icon
    Focus Areas: Business Information Security Officer (BISO); Executive Alignment; Security Career Paths
    speaker photo
    Sr. Director, BISO, Compass Group
    speaker photo
    BISO/CISO, ILIAS Federal Solutions (IFED), Inc.
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am
    As cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.
    In this engaging panel discussion, regional BISOs  share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.
    Attendees will gain:
    Join us to explore the intersection of business and security and how mastering both can accelerate your career.
    10:15 am
    Data Security: The Missing Context
    • session level icon
    speaker photo
    Director, Engineering, Concentric AI
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.

    Attend this session to learn:

    • Why traditional approaches to data security have failed
    • How AI and context are revolutionizing data security
    • Where to maximize the value of your existing security investments
    • What you can do to secure your Gen AI rollouts

    With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

    10:15 am
    [Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral Analytics
    Focus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access Governance
    speaker photo
    Director, Enterprise Sales Engineering - Great Lakes, Arctic Wolf
    speaker photo
    Head of Technology Risk, Acrisure
    Registration Level:
    10:15 am - 10:50 am

    The human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.

    Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    Top 10 Most-Needed AI Skills in Cybersecurity – "Draft Day" to Accelerate Your Career
    speaker photo
    Lead Information Security Analyst, TIAA
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    This bonus session in the Networking Hall will name the top 10 AI skills needed in cybersecurity now and explain why they are in such high demand. This ranking has been compiled based on Charles Hartley’s external and internal research as a senior content specialist for TIAA’s Cybersecurity Awareness Team. This will be a unique presentation in the style of the NFL’s Draft Day. Commissioner Hartley, “with the next pick in the AI career draft….”

    11:10 am
    The Human Side of Cybersecurity
    • session level icon
    Focus Areas: Security Culture; Security Awareness Training; Social Engineering
    speaker photo
    Sr. Information Security Analyst, LPL Financial
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    This session focuses on the human side of cybersecurity. It’s important because with today’s evolving threats, technology controls won’t always protect your business. Increasingly sophisticated attacks often rely on human error for success, rather than just technical flaws or vulnerabilities. Humans are the first line of defense, and by building a stronger security culture, your business can better identify social engineering tactics to reduce risk and have a staff that is more security conscious.

    11:10 am
    From Identity Controls to Business Impact: Making IAM Work for Leaders
    • session level icon
    Focus Areas: IAM Strategy & Business Alignment; Risk & Cost Optimization; Executive Communication & GRC
    speaker photo
    VP, Information Security, Pathward
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am
    Identity and Access Management is no longer just a technical control—it’s a business enabler. This session helps security and business leaders rethink IAM through the lens of outcomes, not tools. Using real-world examples from regulated environments, attendees will learn how to prioritize IAM initiatives that reduce risk, lower cost, and improve workforce experience. The talk focuses on practical decision-making, balancing security, usability, and feasibility, and avoiding common pitfalls that stall IAM programs. Attendees will walk away with a clear framework for aligning IAM investments to business priorities and communicating value to executive stakeholders.
    11:10 am
    Kill the Attack Chain: Stop Ransomware Before It Starts
    • session level icon
    Focus Areas: Ransomware Defense & Resilience; Zero Trust & Microsegmentation; Cyber Kill Chain Strategy
    speaker photo
    Director, Security Strategy & Technology, Akamai
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Ransomware continues to escalate despite increased security investments because the encryption is only one step in a broader attack chain. By focusing on the full kill chain, security teams gain more opportunities to stop attackers before widespread damage occurs.

    Learn how micro segmentation can disrupt adversarial techniques before and after ransomware deployment. Discover how shifting your strategy to the entire attack chain can reduce risk, limit impact, and accelerate recovery. Learn how to:

    • Disrupt the kill chain before ransomware is deployed
    • Use AI to map complex environments and accelerate policy enforcement
    • Leverage segmentation to enable rapid remediation without disrupting operations
    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    speaker photo
    CISO, AnMed Health
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    LUNCH KEYNOTE
    • session level icon
    speaker photo
    Director, Solution Engineering, Island
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber on the Grid: NERC CIP Audits & Enforcement
    speaker photo
    Manager, CIP Monitoring, SERC Reliability Corporation
    speaker photo
    Legal Counsel, SERC Reliability Corporation
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    This discussion delves into NERC CIP standards, detailing their history, governance, and structure to enhance cybersecurity for the Bulk Electric System (BES). Attendees will explore how these standards align with risk-based audits, addressing asset identification, secure access controls, and incident response. Key insights include the standards’ modular framework, governance by FERC and regional entities, and their evolution to safeguard North America’s power grid. The session highlights risk-based monitoring to ensure compliance and effective threat mitigation, offering actionable guidance for professionals navigating NERC CIP in a dynamic regulatory environment.

    This discussion will also address what happens when a registered entity is deemed to be noncompliant with a standard and what that enforcement process looks like, including how findings are documented, how mitigation plans are developed and tracked, and how enforcement outcomes are determined.

    1:15 pm
    BEC Bang! A Business Email Compromise Table-Top Exercise
    • session level icon
    Focus Areas: Business Email Compromise (BEC); Incideent Response; Tabletop Excercise
    speaker photo
    Principal Investigator & CEO, Rexxfield/Dougherty Intelligence & Investigations
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    In this interactive, table-top exercise session, the audience is divided into 2 or 3 separate groups and designated as companies or entities doing business together. A BEC incident is introduced, and the group is asked to tabletop how to remedy the BEC incident from different perspectives of financial victims, compromise victims, and affected third parties. A gamification of the participation will show which group would have the better chance at a proper recovery based on prior investigations and incidents.

    1:15 pm
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Session details to come.

    1:15 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:50 pm
    Networking Break & Cyber Connect:
    • session level icon
    Ask Me Anything! A Live Conversation with Security Leader
    speaker photo
    CISO, Novolex
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    Session details to come.

    2:10 pm
    Creating a Resilient Compliance Culture with CMMC
    • session level icon
    Focus Areas: CMMC (Cybersecurity Maturity Model Certification); Compliance and Regulatory Affairs; Security Culture
    speaker photo
    Director, Cybersecurity and Governance, SteelFab, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    With the final CMMC rule now published and enforcement set to begin for new U.S. Department of War contracts, companies across the supply chain are facing a major shift in how compliance, cybersecurity, and business success intersect. In this session, we’ll explore how companies can achieve CMMC compliance; not just to meet regulations, but to build a stronger, more resilient security culture.
    We’ll walk through practical steps to roll out new requirements to your employees and embed security and compliance into day-to-day business operations. Whether your business is already working with defense contracts or simply wants a more robust approach to compliance and security, you’ll leave with actionable ideas you can apply now.
    2:10 pm
    Interdependency: The Emerging Operational Security Dependencies Between Data Centers and Electric Utilities.
    • session level icon
    Focus Areas: Critical Infrastructure Security (CIS); Operation Technology (OT) Security; Supply Chain Risk Management
    speaker photo
    Senior Security & Regulatory Affairs Advisor, SERC Reliability Corporation
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    The critical role of data centers in sustaining global economic health and societal function has been widely acknowledged and scrutinized. Increasingly recognized as critical infrastructure, data centers operate around the clock to provide essential services. As digital infrastructure continues to advance, data centers are entering a new era shaped by artificial intelligence (AI) and high-performance computing. These facilities require uninterrupted, stable electricity from their serving utilities to maintain operational efficiency. This dependency creates a reciprocal relationship in which the reliability and security of the utility directly impact the reliability and security of the data center, and vice versa.

    2:10 am
    Your Internal AI: Empowering Innovation While Reducing Inadvertent Insider Threats 
    • session level icon
    Focus Areas: AI Security & Governance; Insider Risk Management; Data Privacy & Compliance
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 am - 2:45 pm
    The explosive adoption of generative AI and large language models (LLMs) has transformed how organizations work, enabling employees at all levels to accelerate tasks, generate insights, and drive innovation. Yet this democratization of AI potentially introduces a significant and often overlooked risk: inadvertent insider threats.
    This presentation examines how the convenience of “unsubscribed” mainstream AI tools has dramatically increased the attack surface for data exfiltration through non-malicious insider actions. We will explore real-world consequences, regulatory implications, and the growing awareness gap that leaves even sophisticated organizations vulnerable.
    The core message is one of empowerment rather than restriction: organizations can and should provide their teams with the full power of state-of-the-art LLMs without compromising security. “Your Internal AI” introduces a secure, enterprise-ready alternative that enables seamless use of mainstream models while automatically safeguarding sensitive information.
    Through intelligent pre-processing, redaction, anonymization, and policy enforcement, sensitive data is protected before it ever leaves the organization’s control, ensuring compliance and preserving privacy.
    Attendees will see this solution in action through a live demonstration, illustrating how users can interact naturally with powerful LLMs in everyday business related activities, while the system transparently secures confidential content in real-time.
    By the end of the session, participants will understand not only the risks posed by unchecked AI usage but also how to deploy “Your Internal AI” as a strategic enabler: delivering the productivity gains of cutting-edge AI to every employee, securely and responsibly.
    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] The Changing Dynamics of the Role of a CISO in the Age of AI
    • session level icon
    Focus Areas: CISO Strategy; AI Governance and Ethics; Proactive Risk Management
    speaker photo
    VP & Global CISO, HanesBrands Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    As the role of CISO continues to evolve, several key trends are shaping the future responsibilities of individuals in this position and their teams:

    1. There is a noticeable trend towards increased scrutiny on the decision-making processes of CISOs. Stakeholders are placing a greater emphasis on understanding and evaluating the rationale behind cybersecurity strategies and actions.

    2. Ethical considerations in handling data breaches are becoming a focal point for CISOs. It is essential for CISOs to not only address breaches effectively but also to do so in an ethical manner that prioritizes the protection of individuals’ data and privacy.

    3. The landscape of regulations governing CISO roles may be shifting towards more stringent requirements. CISOs may need to navigate a complex web of compliance standards and regulations to ensure the organization’s cybersecurity practices align with legal expectations.

    4. Proactive cybersecurity measures are gaining importance within organizations. CISOs are expected to anticipate and mitigate potential threats before they materialize, rather than solely reacting to incidents after they occur.

    5. Building a culture of transparency and accountability within CISO teams is emerging as a critical focus area. CISOs are tasked with fostering an environment where team members feel empowered to raise concerns, share information, and take ownership of cybersecurity initiatives.

    Hear how CISOs and their teams can navigate the new age of cybersecurity, one that is continually evolving.
    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • AccessIT Group
    Booth: 300

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Akamai Technologies
    Booth: 315

    Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. With the most distributed compute platform—cloud to edge—customers can build modern apps while keeping experiences closer to users and threats farther away. Learn about Akamai’s security, compute, and delivery solutions at akamai.com.

  • Arctic Wolf Networks
    Booth: TBD

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Black Duck
    Booth: TBD

    Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.

  • Canary Trap
    Booth: 220

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Chainguard
    Booth: TBD

    Chainguard Images provide the building blocks for a secure software supply chain. Leverage container images that have cryptographic signatures, SBOMs, SLSA provenance, and more to help meet compliance and prevent supply chain attacks.

  • Charlotte IT Professionals
    Booth: TBD

    We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.

  • Charlotte Metro ISC2
    Booth: TBD

    The Charlotte Metro ISC2 chapter is a 501c3 non-profit organization, whose mission is to advance information security in the local communities throughout the Charlotte Metro area. We provide our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate. We are committed to engaging in public service activities and outreach to advance cybersecurity awareness in the broader community.

  • Charlotte Metro ISSA
    Booth: TBD

    The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.

  • Check Point Software Technologies
    Booth: TBD

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Clarity Security
    Booth: 225

    Clarity Security makes identity governance autonomous, intelligent, and effortless. Powered by attribute-based access control, we automate user access reviews and every aspect of identity lifecycle management—saving time, cutting cost, reducing risk, and turning IT into a business enabler.

  • Concentric AI
    Booth: 325

    Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.

  • Delinea
    Booth: 205

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • Exabeam
    Booth: TBD

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Expel
    Booth: TBD

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • Harmonic Security
    Booth: 430

    Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.

    Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.

  • ISACA Charlotte
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

  • Infoblox
    Booth: TBD

    Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.

  • Island
    Booth: 320

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • Knightz Group
    Booth: TBD

    Knightz Group is a boutique cybersecurity firm, blending enterprise-level expertise with nimble, client-first execution. We provide and manage compliance driven, operationally focused solutions for complex environments.

  • Lake Norman IT Professionals
    Booth: TBD

    Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!

  • Lightbeam
    Booth: 210

    LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.

  • Logically
    Booth: 120

    Logically is a leading national managed security and IT solution provider that helps organizations secure and support their businesses today, solve for tomorrow, and strategize for the future with cyber-first solutions. Our team of experts, including cybersecurity, engineering, networking, and cloud specialists, collaborate with customers to implement solutions that protect their assets, reduce risk, and optimize performance, end to end. Since 1999, we have made long-term relationships, customer service excellence, and purposeful innovation guiding principles to ensure customers have a trusted advisor at their side, helping them focus on their business, not the technology behind it.

  • Netskope
    Booth: TBD

    Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.

  • Netwrix
    Booth: TBD

    Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact.
    More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

  • Nudge Security
    Booth: 215

    Nudge Security is a SaaS security company offering a platform to manage and secure an organization’s SaaS applications. The platform provides visibility and governance over SaaS and cloud assets, including shadow IT, and quickly discovers SaaS accounts via read-only API access. It also delivers vendor security profiles, compliance attestations, and alerts for SaaS supply chain breaches.

  • Optiv
    Booth: 500

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Ovalix, Inc.
    Booth: 110

    Ovalix empowers organizations to confidently embrace AI technology by mitigating associated risks such as data leakage, malicious prompts, shadow AI, and regulatory non-compliance across AI applications ranging from basic LLMs to sophisticated AI Agents. By ensuring robust security, maintaining regulatory integrity, and preventing data breaches, Ovalix enables organizations to unlock the transformative power of AI with peace of mind.

  • Phish Club
    Booth: TBD

    Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.

    Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!

  • Ping Identity
    Booth: 440

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • SecPod Technologies, Inc.
    Booth: 145

    SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
    At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
    • Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
    • Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.

    With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.

  • SecurityScorecard
    Booth: TBD

    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.

  • Security Journey
    Booth: 420

    Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely–it turns everyone in the SDLC into security champions.

    Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications.

  • Semperis
    Booth: 330

    For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.

    As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) ConferenceHIP Podcast and free identity security tools Purple Knight and Forest Druid.

  • SIM Charlotte
    Booth: TBD

    The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:

    • Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
    • Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
    • Challenging our comfort levels by exchanging ideas with peers and business counterparts.
    • Being a resource for each other, and personal networking.
  • Splunk, a Cisco Company
    Booth: 335

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • SpyCloud
    Booth: 435

    SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts worldwide. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. Learn more & check your exposure at spycloud.com.

  • Sublime Security
    Booth: 115

    Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.

  • Sumo Logic
    Booth: 200

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Structured
    Booth: 130

    Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For nearly 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.

  • Tenable
    Booth: 500

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • Tevora
    Booth: TBD

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Torq
    Booth: TBD

    Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.

  • Trinity Cyber
    Booth: TBD

    Trinity Cyber is an international cybersecurity firm that invents and operates innovative solutions to the most difficult cybersecurity challenges. The company’s products and services replace multiple market segments in the traditional cybersecurity market, with customers in over a dozen of the largest market verticals. The company’s founders, management team, and technologists are all award-winning, recognized leaders in their field—and their tech has revolutionized network security.

  • Veeam Software
    Booth: TBD

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • WiCyS North Carolina Affiliate
    Booth: TBD
  • Zafran Security
    Booth: TBD

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Ahanu Boyle, Instructor
    Associate Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Ahanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.

    Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.

    Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.

  • speaker photo
    Mike Brannon, Moderator
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Nia F. Luckey
    Chief of Staff, Cyber and Third-Party Tech Risk Team, AT&T

    Nia Luckey is a cybersecurity executive, author, and TEDx speaker focused on helping organizations rethink how trust actually works in security. With years of experience across military service, enterprise security, and executive advisory, she works with CIOs, CISOs, and boards to turn risk conversations into practical, defensible decisions. Nia’s work emphasizes the human side of cybersecurity, where leadership, culture, and accountability matter just as much as tools and controls. At SecureWorld, she brings real-world insight, candor, and a focus on what actually works.

  • speaker photo
    Rob Dalzell, Moderator
    Identity and Access Management – Risks, Issues, Controls and Governance, AT&T

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte, and enjoys connecting with others that work in Cybersecurity. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. He is an ardent believer in life-long learning. In his spare time, he can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house, and trying to keep a British sports car running.

  • speaker photo
    Panel Discussion
  • speaker photo
    George Douglas
    Sr. Director, BISO, Compass Group

    Experienced Senior Director with a proven track record in the Security and Artificial Intelligence domains, particularly within the Group Purchasing Organization (GPO) space. Brings expertise in strategic planning, AI-driven analytics, cybersecurity frameworks, team leadership, and operational excellence.

  • speaker photo
    Elvis Moreland, Moderator
    BISO/CISO, ILIAS Federal Solutions (IFED), Inc.

    Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.

    Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.

  • speaker photo
    Jim Robertson
    Director, Engineering, Concentric AI

    Jim has more than 10 years of experience in the data security space and has been an Sales Engineer at Varonis, StealthBits (Netwrix), Splunk, IBM, and Bionic AI. Before that, he served in network and systems engineering roles at MSPs in the upper Midwest. His broad experience in deploying and securing systems and data has translated into thought leadership about the practical challenges in the data security posture management space.

  • speaker photo
    Ken Smith
    Director, Enterprise Sales Engineering - Great Lakes, Arctic Wolf

    Ken Smith is the Director of Sales Engineering – Enterprise (Great Lakes) at Arctic Wolf, with 15 years of experience spanning offensive security, sales engineering, and education. A former SIGINT operator with 5th Special Forces Group (Airborne), Ken went on to serve as a red team consultant and team lead in multiple roles. He also spent a decade developing and delivering university coursework in network and application security. Ken has presented at Thotcon, Hack Space Con, and other regional conferences, and currently serves on the Board of Directors for BSidesCLE.

  • speaker photo
    Jack Freund, PhD, Moderator
    Head of Technology Risk, Acrisure
  • speaker photo
    Panel Discussion
  • speaker photo
    Charles Hartley
    Lead Information Security Analyst, TIAA

    Charles Hartley is a lead information security analyst with TIAA. His focus is on researching and creating compelling AI/cybersecurity content. He has a master's degree in business administration and journalism, and he has 30-plus years in the high-tech industry.

  • speaker photo
    Michael Terry
    Sr. Information Security Analyst, LPL Financial

    Mike Terry is a member of LPL’ Advisor and Investor Cybersecurity Team who has been with LPL for 10+ years.   In his current role, Mike educates advisors and their investors about cybersecurity; offering them with best practices to stay safe, protect sensitive information, and avoid cyber-threats.  Before transitioning to this role, he supported advisors with a number of different initiates.  Prior to working at LPL, Mike worked in the financial services industry with companies like Capital One and Wells Fargo.  Outside of work, he enjoys spending time with his family

  • speaker photo
    Tracey Hughes
    VP, Information Security, Pathward

    Tracey Hughes is a Vice President of Information Security specializing in Identity and Access Management and Security Governance, Risk and Compliance. With over 26 years of experience, she has led enterprise IAM programs across financial services, consulting, and global technology organizations, including IBM, Deloitte, and Kudelski Security. Tracey focuses on aligning identity strategy to business outcomes, regulatory requirements, and operational reality. She holds an MBA, a master’s degree in computer science, and multiple certifications including CISSP, CCISO, CISM, PCI ISA, and PMP. Known for her practical, business-focused approach, Tracey brings real-world insight to identity leadership challenges.

  • speaker photo
    Sean Flynn
    Director, Security Strategy & Technology, Akamai

    Sean Flynn is Director of Security Strategy and Technology for Akamai Technologies. Currently he works with companies to ensure Akamai’s Security Vision aligns with and fits industry and customer needs. He also acts as a trainer for web and enterprise security for internal groups. Sean has over 16 years of IT security experience working for networking and application security vendors. Sean joined Akamai in 2012, implementing Akamai security solutions for companies. He was hands-on, helping protect customers from active attacks by state-sponsored actors, hacktivists, and cyber criminals. He has consulted some of the largest customers in Finance, Commerce, and Healthcare on Akamai solutions, implementing application, network, and enterprise security, and security best practices.

  • speaker photo
    Panel Discussion
  • speaker photo
    Scott Dickinson, Moderator
    CISO, AnMed Health

    Scott Dickinson is passionate about Information Technology and Information Security and has more than 20 years in the fields of information security and information technology. He has worked with Federal and State governments to include FBI, DOD, Veteran Affairs, State of SC, and the private sector. He has been a CIO, a CISO, a virtual CISO, Cyber Security Division Director and a variety of positions leading up to those roles. He currently serves as the CISO at AnMed. He enjoys being exceptional as a security leader and is constantly looking for ways to improve the security posture of companies. He currently holds the CISSP and CCSP certifications.

  • speaker photo
    Matt Pour
    Director, Solution Engineering, Island

    Matthew Pour is a seasoned leader in Information Technology and Information Security, currently leading Island's North America Solutions Engineers. With decades of experience, he has successfully established ITIL practices and InfoSec programs for Fortune 500 companies and engineered solutions for complex business challenges at leading technology and cybersecurity firms. Previously, Matthew served as a Field CTO at Broadcom and held key technical leadership roles at Symantec, Blue Coat, and IBM, consistently demonstrating his strategic vision and expertise in navigating the evolving landscape of information security.

  • speaker photo
    Jim Doggett, Moderator
    CISO, Semperis

    James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.

  • speaker photo
    Jermaine Green
    Manager, CIP Monitoring, SERC Reliability Corporation

    Jermaine Green, CISA, CISSP, and a 2025 Cisco Champion, is a seasoned Cybersecurity CIP Audit Manager at SERC Reliability Corporation. In his role, Jermaine leads the CIP Audit team to ensure that power companies across the Southeastern United States maintain reliable and secure operations in compliance with critical infrastructure protection standards. With a robust background in network engineering, wireless technologies, and firewall management, he brings a wealth of expertise to safeguarding the region’s power grid. His technical acumen and commitment to operational excellence make him a vital contributor to the cybersecurity and reliability of critical infrastructure.

  • speaker photo
    Joe Tromba
    Legal Counsel, SERC Reliability Corporation

    Joseph Tromba brings almost five years of experience in the energy industry and seven years of experience as an attorney. As an Enforcement attorney, he has made significant contributions to many different projects and initiatives at SERC and the ERO Enterprise.

    With a background in business management in college then primarily intellectual property law throughout law school, Joseph started his legal career as an Associate Attorney at Glynn, Mercep, and Purcell LLP (GMP) in East Setauket, New York. During his tenure at GMP, Joseph concentrated in many different types of civil litigation. His practice areas included, but were not limited to, real property litigation, commercial litigation, personal injury litigation, construction litigation, trust litigation, restrictive covenants, product liability, breach of contract, defamation, civil forfeiture, traffic violations, real estate transactions, and the drafting and execution of wills. As outside counsel, he aided and assisted in board meetings, disciplinary hearings, and depositions. Joseph received one of the Top 100 Personal Injury Settlements, which was also one of the Top 50 Motor Vehicle Accident Settlements, in New York in the year 2019.

    Since June 2021, Joseph has been involved in SERC’s Enforcement department where he has acted as the case manager for a number of noncompliances involving different entities and including various CIP and O&P NERC Reliability Standards. He has had several other responsibilities as well, such as handling Procurement at SERC Reliability Corporation and hosting the official SERC Podcast, “What’s the Bright Idea with SERC”. Before Joseph’s time at SERC and in the energy industry, he previously published an article that provides an analysis of the Fair Use Doctrine in copyright law.

    Joseph is a staunch advocate for leaving a positive impact, believing strongly in leaving this world better than how you found it. By extension, he is dedicated to improving both SERC and the energy industry, aiming to leave a positive impact that will continue on.

  • speaker photo
    Stephen Dougherty
    Principal Investigator & CEO, Rexxfield/Dougherty Intelligence & Investigations

    Stephen is an accomplished U.S. Secret Service investigator with 9-plus years of experience leading complex cybercrime, financial fraud, and international cybercrime investigations. He is recognized for pioneering the U.S. Secret Service’s Business Email Compromise Mission Desk, resulting in the recovery of nearly $500 million in victim funds. He was awarded two U.S. Secret Service Director’s Impact Awards, 2021 U.S. Secret Service Employee of the Year Award, and two DHS Secretary’s Gold Medals of Excellence for outstanding leadership, innovation, and impact. Stephen is an experienced public speaker and instructor, having delivered more than 50 global keynotes to executives, policymakers, and law enforcement on topics including cyber-enabled financial crime, digital forensics, and public-private collaboration. He is dedicated to bridging the gap between law enforcement, government, and the private sector to combat the world’s most sophisticated digital threats through intelligence-driven investigations, rapid response, and cross-border partnerships.

  • speaker photo
    Panel Discussion
  • speaker photo
    Matthew Burroughs
    CISO, Novolex
  • speaker photo
    Nathanael Dick
    Director, Cybersecurity and Governance, SteelFab, Inc.

    Nathanael Dick, CISSP, MBA, is the Director of Cybersecurity and Governance at SteelFab, Inc. in Charlotte. He leads the company's cybersecurity initiatives and is passionate about leveraging compliance as a tool to enhance organizational cyber maturity. In his free time, Nathanael cohosts the Cybersecurity podcast, discussing cybersecurity topics in a frank open atmosphere.

  • speaker photo
    Travis Moran
    Senior Security & Regulatory Affairs Advisor, SERC Reliability Corporation

    Travis Moran is a retired law enforcement professional with over 30 years of enforcement, security, and intelligence experience with Interpol, the U.S. Department of State and U.S. Department of Justice, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). He serves as the Senior State Government & Regulatory Affairs Advisor, for SERC Reliability Corporation. SERC is specifically responsible for the reliability and security of the electric grid across the southeastern and central regions of the United States.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Panel Discussion
  • speaker photo
    John Opala, PhD
    VP & Global CISO, HanesBrands Inc.

    Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.

    Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.

    In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
    Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
    Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.

    Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.