googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 25, 2023
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Offsite at Host Hotel

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    9:00 am
    [PLUS Course] Real-World Cyber Risk Management and Resilience Planning
    • session level icon
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Boardroom at The Plano Center

    Key components covered include:

    1) Lifecycle for investigating and responding to a cyberattack (such as a ransomware attack)
    2) The legal, compliance, and regulatory issues that arise from such attacks
    3) Legal and regulatory requirements for cyber risk management programs
    4) Assessing and understanding the real-world business impact cyber risk has on the company
    5) Prioritizing risks and developing a strategic action plan to execute
    6) Implementing simple and cost-effective strategies that take into account legal, compliance, and regulatory requirements
    7) The role of cyber insurance in overall resilience and incident response preparation

  • Thursday, October 26, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Guest Speaker: ISC2 Dallas-Fort Worth Chapter Meeting
    • session level icon
    Is AI the Treat or the Trick this Halloween as You Plan Your 2024 Budget?
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: Sunny Slope I & II

    Trick or treat!? As AI becomes a necessary evil (or is it?) for cybersecurity professionals, and bad actors try to use it for nefarious reasons, this ISC2 meeting for members and non-members explores the AI topic. Does the “artificial” in AI mean fake intelligence or an impersonation, or is it a real tool that can be used for good? Come listen and join the conversation, which is a nice tee-up for the opening keynote panel that tackles the topic of “Implications of ChatGPT and Other Similar AI Tools.”

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Implications of ChatGPT and Other Similar AI Tools
    speaker photo
    CISO, Brink's Inc.
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: Springlade I & II
    ChatGPT (Generative Pre-trained Transformer) is a language model developed by OpenAI. It is based on the Transformer architecture and is one of the largest and most powerful language models available today. ChatGPT has been pre-trained on massive amounts of text data and can generate human-like text in response to prompts given to it. ChatGPT, and other AI programs, have the potential to revolutionize the way we interact with technology and each other. With any new technology there are negatives and positives. Come ready to add to the discussion with your peers at this invitation-only breakfast meeting of the SecureWorld Dallas Advisory Council.
    8:00 am
    Supporting Victims of Cybercrime: The Cyber Helpline
    • session level icon
    speaker photo
    Director & Helpline Manager, The Cyber Helpline
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: Fairview I & II
    The Cyber Helpline is a U.K. charity that supports over 2,000 victims of cybercrime every month by linking them with cybersecurity experts for free, professional help. The charity is delighted to be launching a pilot in the U.S. and to bring with them a wealth of expertise and knowledge to address a major gap and cybersecurity challenge in the States. Cybersecurity professionals are best placed to fill the gap in support for individuals experiencing cybercrime, but the impact, trends and the importance of giving safe advice means that it differs from “traditional” cybersecurity. Individuals facing cybercrime face unique challenges and require tailored support and expertise, which isn’t always available. This presentation provides an insight into the threats facing individuals in the online space, the impact it has on them, why the advice that you might give your friends and family could be inadvertently dangerous and how you can use your expertise and resources to make a difference in people’s lives with the skills you have, just by learning to apply them to a different audience. The session will allow for a Q&A to provide attendees with the chance to ask questions and understand more about this emerging career pathway and opportunities and responsibilities that their organizations have to support victims of cybercrime.
    9:00 am
    [Opening Keynote] Implications of ChatGPT and Other Similar AI Tools
    • session level icon
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    speaker photo
    Treasurer, ISC2 Dallas-Ft. Worth
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    ChatGPT (Generative Pre-trained Transformer) is a language model developed by OpenAI. It is based on the Transformer architecture and is one of the largest and most powerful language models available today. ChatGPT has been pre-trained on massive amounts of text data and can generate human-like text in response to prompts given to it. ChatGPT, and other AI programs, have the potential to revolutionize the way we interact with technology and each other. With any new technology there are negatives and positives. Let’s explore from the perspective of leaders in security, legal, marketing and cyberpsychology.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    My System Can Kick Your System's @ss: Practical Lessons from the Military Weapons Systems Cybersecurity Trenches
    • session level icon
    speaker photo
    Fellow, Cyber Risk Assessment, Lockheed Martin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Northbrook I-III
    How do you secure a system that doesn’t have firewalls, anti-virus, or other standard enterprise IT protection mechanisms? The vast majority of military aircraft was designed and developed before current standards cybersecurity and resiliency were first conceptualized. Additionally, these platforms frequently come with eclectic operating systems, programming systems, and hardware. Yet these systems must operate securely in cyber contested environments where the stakes are high. This presentation is a rare opportunity to vicariously experience some of the hardest challenges in military aviation and benefit from the lessons learned.
    10:15 am
    Special Delivery! Defending and Investigating Advanced Intrusions on Secure Email Gateways
    • session level icon
    speaker photo
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Fairview I & II

    In today’s enterprise environments, secure email gateways play a critical role in filtering and scrutinizing email content for potential threats. Positioned at the intersection between the public Internet and corporate email servers, these gateways become highly coveted targets for malicious actors. The recently disclosed vulnerability in the Barracuda Email Security Gateway (ESG), CVE-2023-28686, had a significant impact on organizations worldwide while providing a level of access to threat actors in an environment that significantly enabled their overall objectives.

    This talk dives into firsthand encounters from our investigations into these intrusions right from their infancy. The session provides an insightful walkthrough of the threat actors’ playbook and attack path, explore available logs and artifacts that aid in analysis, presents a comprehensive methodology to shed light on these malicious activities, and actionable remediation actions to reduce the attack surface. By the end of this session, attendees will be empowered to identify malicious activity within their secure email gateways and possess the necessary defense strategies to combat such threats.

    10:15 am
    Introduction to Adversarial Machine Learning
    • session level icon
    speaker photo
    Security Researcher, Nokia
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Sunny Slope I & II

    With the increased reliance and use of machine learning across all industries, the attack surface in many organizations’ environments has increased. Although machine learning has many benefits, it also leads to new risks. It is crucial to understand the new security risks that machine learning brings in order to protect systems that rely on these technologies. In this presentation, attendees will learn about the different types of attacks that machine learning is vulnerable to. In addition, attendees will gain an understanding of the difference between artificial intelligence and machine learning, what adversarial machine learning is, how machine learning attacks occur, real-world case studies, and an introduction to current open-source tools offered by the industry to ensure that machine learning has been secured. By the end of the presentation, attendees will have an understanding of machine learning and its contributions to the cyber threat landscape as well as some measures they can take to increase the security of machine learning.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Using KPIs to Measure the 5 Pillars of Cyber Resilience
    • session level icon
    speaker photo
    Sr. Information Systems Auditor, Parkland Health & Hospital System
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Fairview I & II
    Proper Key Performance Indicators and audit results are a sound base for measuring resilience. True resilience is about learning to be robust/strong enough against high dynamic threats. It is steadily improving your security measures/systems/infrastructure by measuring your resistance against a fast-changing environment. Come ready to hear how to build a solid cybersecurity foundation and increase resilience by performing a risk assessment with measurable controls.
    11:10 am
    [Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital Orchestra
    • session level icon
    Identifying the Current Threat Landscape
    speaker photo
    SVP & CISO, Sunflower Bank
    speaker photo
    Sr. Manager, Operations IT – Applications Security, Verizon
    speaker photo
    Principal Security Practitioner, Horizon3.ai
    speaker photo
    CIO/CISO, FUTU US Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Northbrook I-III

    In the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.

    Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.

    Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.

    11:10 am
    The Future of AI in Security
    • session level icon
    speaker photo
    Senior Product Marketing Manager, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Sunny Slope I & II

    There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?

    Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?

    This discussion will explore:

    • The history of AI, ML, and automation already in your security stack
    • The dangers and challenges of unrestricted GPT and other chat bots as information sources
    • Ways humans and AI can work together
    12:00 pm
    [Lunch Keynote] Drag Racing & Cybersecurity: The Crossover
    • session level icon
    speaker photo
    CISO, United Musculoskeletal Partners
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    You’d be amazed what you can learn from everyday hobbies or obstacles to help you become a better practitioner. Krista Arndt shares a very personal story of survival after a bad drag racing accident in 2015. It was a life-altering experience and provided perspective on her personal and professional life that drives her every day as a loving mom and wife, volunteer, and successful CISO.
    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    The State of Cybersecurity in 2023: The Good, the Bad, and the Unknown
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Springlade I & II

    The bad actors are getting more sophisticated. A new “hybrid war” landscape thanks to the Ukraine-Russian war and now the Israel-Hamas war. Current and developing vectors for attacks: BEC, malware, phishing, DDoS, spyware, ransomware, and more. Join this VIP lunch roundtable for SecureWorld Dallas Advisory Council members to rub elbows and commiserate with CISO peers and invited guests to share ideas, best practices, and lessons learned in the fight to keep the public and private sectors safe from cybercrime. And let’s not forget the challenge of filling the cybersecurity talent pipeline.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    [Panel] Cover Your Cyber Assets
    • session level icon
    speaker photo
    Director, Cyber Underwriting, Safety National
    speaker photo
    Claims Director, Cowbell
    speaker photo
    Consultant, Cyber Risk Solutions Team, WTW
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: Northbrook I-III
    What will drive the next big wave of information security improvements at U.S. organizations? Instead of regulation, it may be insurance. A two-pronged evolution is underway. Insurance policies are suddenly becoming more prescriptive for organizations, often requiring companies meet certain cybersecurity benchmarks before a policy can be written. At the same time, “InsureTech” is emerging on the scene. This involves a new breed of insurance company that provides cyber coverage and also scans the insured’s environment to constantly monitor for IT and cyber risk. Join this keynote panel as we discuss this evolution and look at future impacts of cyber insurance on security leaders and their teams.
    1:15 pm
    Chief Scapegoat Officer Perspective
    • session level icon
    speaker photo
    Executive Director, Americas Region, CREST
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: Sunny Slope I & II
    Join industry veteran Tom Brennan, with 30 years of insights from running enterprise organizations, teams, and securing what matters most. He provides important considerations for reducing your attack surface, digesting threat intelligence, and implementing powerful solutions. The session also has an interactive component, so come prepared to play a game and collaborate!
    1:15 pm
    Cybersecurity: The Hidden Driver of Innovation and Enablement
    • session level icon
    speaker photo
    Deputy Director of IT, CISO, City of Arlington
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Fairview I & II

    The relationship between cybersecurity, innovation, and business enablement is symbiotic. Cybersecurity is no longer a hindrance but a crucial enabler of innovation by creating a foundation of trust and fostering a secure environment that enables organizations to meet their goals. This session explores emerging technologies in cybersecurity, the importance of security and privacy by design, and how these factors can drive and protect innovation in the digital age.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:30 pm
    Continuous Monitoring: Staying Ahead of the Game
    • session level icon
    speaker photo
    Senior Manager, Weaver
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: Sunny Slope I & II

    With security threats and technology constantly evolving at a high pace, organizations cannot afford to wait for the annual third-party report to find out where compliance and security issues lie. To close the gap, more and more organizations are implementing a Continuous Monitoring program supported by automation tools to gain early insights as to where weaknesses may exist in their security posture. A good program uncovers findings without waiting on internal or external audits, give teams additional time to plan remediation, and helps keep up with the evolution of security threats around the environment, and that’s before automation is even implemented!

    Objectives of this presentation include sharing:

    • The key components to designing an effective Continuous Monitoring program
    • Whether and when to implement automation to support the program
    • Key considerations to determine whether to run the program in-house or outsource it
    2:30 pm
    Effectively Communicating Risk to the Board
    • session level icon
    speaker photo
    Principal, CI5O Advisory Services LLC
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: Northbrook I-III

    Recent studies and surveys indicate that the communication gap with boards and CISOs is improving, but the pressure to accelerate this is growing daily. For example, even though the final SEC disclosure rule backed off a specific requirement to disclose the board’s cybersecurity expertise, the intent and direction remains for a stronger connection and more effective oversight. This will only amplify as we have more incidents.

    Al Lindseth has been solving board-level issues, wearing multiple hats including Risk Officer, CIO and CISO at a Fortune 100 company, and presenting/collaborating/advising on connecting with boards for decades. The goal of this presentation is to assist CISOs on how to: engage with their boards more effectively in their programs; identify and adjust to specific ‘lifts’ between that baseline and the new SEC rules; and position themselves to capture future opportunities to escalate their role.

    2:30 pm
    Desperate Times Require Direct Action
    • session level icon
    Why Workforce Development Is Cybersecurity's Only Path Forward
    speaker photo
    Chairwoman, CEO & President, Minorities in Cybersecurity, Inc.
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Fairview I & II

    With global cybersecurity job openings of more than 3.4 million, it’s time for cybersecurity professionals to answer the challenge and train the next generation of talent. Gone are the days when we can sit back and wait for the unicorn to appear. We need to make them!We need to explore every pathway possible, including non-traditional ones, into the profession and develop those who have a passion for the space. The apprenticeship pathway is underutilized and often misunderstood but could be the fastest way to close the workforce shortage. Come and learn why cyber workforce development is cybersecurity’s only path forward.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [Closing Keynote] Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn Soles
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater
    In a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.
Exhibitors
  • Association of Continuity Professionals (ACP) North Texas
    Booth: 110

    ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.

    Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week.  We invite you to attend our next meeting.

  • Bitdefender
    Booth: 230

    Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.

    From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.

  • Cisco
    Booth: 120

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • CREST
    Booth: 100

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Envision Technology Advisors
    Booth: 420

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • Exabeam
    Booth: 330

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Horizon3.ai
    Booth: 310

    Horizon3.ai’s mission is to help you find and fix attack vectors before attackers can exploit them. NodeZero, our autonomous penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces.

    Like APTs, ransomware, and other threat actors, our algorithms discover and fingerprint your attack surface, identifying the ways exploitable vulnerabilities, misconfigurations, harvested credentials, and dangerous product defaults can be chained together to facilitate a compromise.

    NodeZero is a true self-service SaaS offering that is safe to run in production and requires no persistent or credentialed agents. You will see your enterprise through the eyes of the attacker, identify your ineffective security controls, and ensure your limited resources are spent fixing problems that can actually be exploited.

  • ISC2 Dallas-Fort Worth
    Booth: 350

    The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

  • InfraGard North Texas
    Booth: 150

    The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:

    • Local quarterly membership meetings focused on infrastructure protection
    • Sector-specific meetings and information exchanges (see Sector Chief Program).
    • Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
    • Networking opportunities with peers within and across all sectors
  • Mandiant, now part of Google Cloud
    Booth: 320

    Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

  • Minorities in Cybersecurity
    Booth: 240

    Minorities in Cybersecurity (MiC) was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field. It is our mission to provide practical knowledge, training, development, and support to our members with the sole purpose of preparing them to become the next generation of global cybersecurity leaders.

    The vision for MiC is to provide a community for underrepresented talent where they can find much needed leadership development and training opportunities to assist them on their cybersecurity career journey.

  • North Texas ISSA
    Booth: 140

    The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.

  • Ping Identity + MajorKey Technologies
    Booth: 130

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

    MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP. We provide Advisory, Integration, and Managed Services for Identity and Access Management, Application Deployment and Security, Data Security and Governance, and Cloud Security. Delivering at the speed of business to protect our client’s identities, apps, data, and systems without hampering their agility. For more information, go to majorkeytech.com.

  • Probely
    Booth: 200

    Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs.

    Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle.

    With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them.

  • SecurEnds, Inc
    Booth: 430

    SecurEnds provides companies with a tool to automate user access reviews (UAR) across cloud and on-prem applications to meet SOX, ISO27001, PCI, HIPAA, HITRUST, FFEIC, GDPR, and CCPA audit requirements. Utilizing fuzzy logic to pull data from systems of record (SOR), complimentary identity governance and administration (IGA) solutions, and SaaS-based, custom, and legacy downstream applications, SecurEnds provides a complete, end-to-end process for UAR, then automates it out of the box.

  • SentinelOne
    Booth: 340

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: 220

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Cyber Fraud Task Force – U.S. Secret Service
    Booth: 300

    Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • Veeam Software
    Booth: 210

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • WiCyS Dallas Forth Worth Affiliate
    Booth: 250
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Shawn E. Tuma, Instructor
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Patrick Benoit, Moderator
    CISO, Brink's Inc.

    Patrick was previosuly the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. He has demonstrated repeated success guiding business strategy to achieve maximum positive business impacts with minimum resource expenditures. Talented at building and launching global technology and security programs, grooming high-performing teams across all domains, plus guiding the digital transformation, enhancing the digital customer experience, driving and enhancing revenue using technology and reducing risk to the business. A skilled executive leader, presenter, negotiator, and businessperson, able to forge solid relationships with strategic partners and build consensus across multiple organizational levels.

    He is certified as C/CISO, CISM, CISSP, CRISC, PMP, ITIL Expert, and Lean Six Sigma Black Belt. He is a pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and his favorite teaching is “From Chaos Comes Greatness,” a loose translation from the “I Ching."

  • speaker photo
    Charlotte Hooper
    Director & Helpline Manager, The Cyber Helpline

    Charlotte is the Helpline Manager at The Cyber Helpline and has supported thousands of victims of cybercrime and online harm, specializing in cyberstalking and technology-facilitated intimate partner violence. On top of her role at The Cyber Helpline, Charlotte has a first-class degree in Policing and Criminal Justice and a masters degree in Cybercrime Investigation. Charlotte delivers cybercrime related training sessions around the world for police forces, victim support charities and private organizations. Her areas of expertise include: Cybercrime investigations, cybercrime law enforcement & regulation, open-source intelligence, cyberstalking & online harassment, the cybercrime & online harm threat landscape and the impact of cybercrime on victims.

    For more, read our interview with Charlotte here: https://www.secureworld.io/industry-news/what-is-the-cyber-helpline

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    William Birchett, Moderator
    Treasurer, ISC2 Dallas-Ft. Worth
  • speaker photo
    Teresa Merklin
    Fellow, Cyber Risk Assessment, Lockheed Martin

    Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.

  • speaker photo
    Nader Zaveri
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud

    Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states. He also leads the remediation efforts with his knowledge and experience by providing strategic short, medium, and long-term remediation recommendations to directors and C-level executives. He also leads the efforts in providing tactical recommendations to specialists, to improve the security posture of an organization. Nader also has experience with leading transformational projects over infrastructure and processes with technical and organizational change components in response to rapidly evolving business needs and regulatory requirements. Nader Zaveri conducted interviews and presentations for dozens of organizations and conferences regarding cloud and on-prem Incident Response and Remediation topics. He regularly provides security updates and briefings to C-Suite personnel during and after an incident, as well as assists with post-remediation and hardening efforts for the organization. Prior to joining Mandiant, Nader Zaveri spent several years in leadership positions at major cyber security consulting firms. Before joining consulting, Nader worked as a lead practitioner for multi-national organizations. When Nader is not working, he is helping and mentoring young professionals with their entry into the workforce and Cyber Security. Nader juggles about 5-10 mentees at a time to help them navigate their studies and career paths.

  • speaker photo
    Anmol Agarwal
    Security Researcher, Nokia

    Anmol Agarwal is a security researcher at a Fortune 500 Company and is focused on securing AI and Machine Learning in 5G and 6G. She holds a doctoral degree in cybersecurity analytics from George Washington University and a master’s degree in computer science from the University of Texas at Dallas. She previously worked at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in the High Value Asset Program Management Office. In her free time, she enjoys giving back to the community and is an active industry mentor.

  • speaker photo
    Michael R. Smith
    Sr. Information Systems Auditor, Parkland Health & Hospital System

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    Industry Certifications, Licensure, & Training
    Certified Information Security Specialist (CISSP)
    Certified Internal Auditor (CIA)
    Project Management Professional (PMP)
    Certified Fraud Examiner (CFE)
    Certified Information Systems Auditor (CISA)
    Information Library Information Technology (ITIL)

  • speaker photo
    Parrish Gunnels
    SVP & CISO, Sunflower Bank

    Parrish is currently SVP & CISO of Sunflower Bank and has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information security. His experience also includes working in multiple industries including financial services, telecommunications, chemical manufacturing, real estate, and retail. In addition, he has worked in both global Fortune 500 companies and small start-up-based companies.

    During his tenure as a CISO, he has been involved in the creation, staffing, building, and management of comprehensive information security programs for various companies across diverse locations and personnel. In all these companies, he has implemented programs based on risk and threat analysis and has implemented controls, services, and processes that have not only met the needs of the company but also the regulatory and compliance requirements of the company including incident response capabilities.

    Parrish holds a Master of Business Administration from Texas Christian University and certifications as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), and Professional Project Manager (PMP).

  • speaker photo
    Steve Pettit
    Sr. Manager, Operations IT – Applications Security, Verizon

    Steve holds the CISSP certification.

  • speaker photo
    Kelly Robertson
    Principal Security Practitioner, Horizon3.ai

    Over 30 years of professional information security experience in 30 countries across various disciplines, technical areas and market segments. Holds key industry certifications including CISSP #409644, F5 and Imperva WAF, Microsoft ISA, CheckPoint, CSI Encryption, and WhiteHat web security analyst. Also serves on the board of Silicon Valley ISSA and participated in several industry consortiums.

    Previously worked at leading companies including SAIC, Nokia, Juniper Networks and White Hat Security before transitioning into security consulting for various startups with Zisher Infosec, which became part of SEC Consult America in 2017. SEC Consult was subsequently acquired by Atos in late 2021. Founded secureCENTRX, a boutique information security consultancy focused on serving Managed Service Providers. Currently Principal Security Practitioner with Horizon3.ai focused on elevating customers and the product.

  • speaker photo
    William Floyd, Moderator
    CIO/CISO, FUTU US Inc.
  • speaker photo
    Cynthia Gonzalez
    Senior Product Marketing Manager, Exabeam

    Cynthia Gonzalez is a Sr. Product Marketing Manager at Exabeam. An advocate for customers, she’s focused on their use of technology to enable and simplify work. She is at her best when bridging the gap between sophisticated software products and the benefits customers can expect.

  • speaker photo
    Krista Arndt
    CISO, United Musculoskeletal Partners

    Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security program in alignment with the business objectives. Additionally, Krista provides oversight of the security program's day to day operational effectiveness.

    Prior to joining UMP, Krista served as the Director of Security Governance, Risk and Compliance for Voyager Digital, a leading cryptocurrency trading platform, where she was responsible for the development, maturation, and maintenance of Voyager's security program. Krista has served in various leadership and operational roles within the information security profession for 14 years within the financial and defense sectors, bringing a deep understanding of how strong security and privacy practices can help enable best in class care and peace of mind for UMP and its practices' patients.

    Krista has a Bachelors Degree in Biology from Felician College and currently holds her Certified in Risk and Information Systems Control (CRISC) and Certified Information Security Manager (CISM) certifications.

    Krista is an active member of ISACA, Infragard's Philadelphia Chapter, as a member of both Neumann University's Business Advisory Council and Women in Cybersecurity-Delaware Valley Affiliate's Membership and Education Committees. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

  • speaker photo
    Kip Boyle, Moderator
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Steven H. Anderson
    Director, Cyber Underwriting, Safety National

    Steve is a cyber liability product leader and underwriter with almost 30 years of experience in both the insurance and technology sectors. In his current role Steve helps drive premium growth through leading operations, product development and underwriting at Safety National. Steve previously served as Chief Underwriting Officer at Measured Insurance and Vice President – Product Leader at QBE North America.

    Steve is a subject matter expert and national speaker on the topic of cyber liability.

  • speaker photo
    Rebecca Barton
    Claims Director, Cowbell
  • speaker photo
    Sean Scranton
    Consultant, Cyber Risk Solutions Team, WTW

    Cyber Liability National Practice Leader (current). IT Security / IT Auditor at RLI for eight years. Network / security consulting / auditor for financial institutions, government for nine years. Network / firewall administrator in healthcare for seven years. Designations: CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Tom Brennan
    Executive Director, Americas Region, CREST

    Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrastructure Security Agency’s 16 critical infrastructure sectors which are vital to U.S. security, national economy, and public health and safety. As CREST USA Chairman, Brennan spearheads strategic plans for CREST USA’s organizational growth while also serving as an industry evangelist and educator on the value of using accredited cybersecurity products and professionals to improve consumer privacy, security, and protection worldwide.

    As a proud U.S. Marine veteran, Brennan became involved with CREST International in 2016 while serving the Global Board of Directors for the Open Web Application Security Project (OWASP). Seeing similar goals, he became more active in the CREST organization and was nominated to lead the organization’s U.S. Advisory in 2019. Over his career, Brennan has amassed security expertise across the cybersecurity spectrum, including penetration testing, vulnerability assessment, application security, threat intelligence, and more. In addition to being CREST USA Chairman, he is the Chief Information Officer of the national law firm Mandelbaum Barrett, overseeing critical infrastructure, privacy, and security operations. He is also an Advisory Board Member of the information services advisory Gerson Lehrman Group, a Cyber Fellows Advisory Council Member, a Member of the Information Technology Advisory Committee of the County College of Morris, a Senior Advisor and Industry Advisory Board Member of the New Jersey Institute of Technology, and a Cyber Fellows Advisory Council Member of the NYU Tandon School of Engineering.

  • speaker photo
    Bryce Carter
    Deputy Director of IT, CISO, City of Arlington

    Bryce Carter is a nationally-recognized leader known for his transformative impact on organizational culture and his ability drive cybersecurity as a key business enabler. Bryce has not only developed groundbreaking security strategies that safeguard data, but has also focused on the broader welfare of communities. His visionary approach has earned him positions on multiple advisory boards, where he helps shapes next-generation policies and technologies. In addition, Bryce contributes to the growth of future leaders by mentoring upcoming executives and technology professionals. His achievements have helped lay the groundwork for a more innovative, resilient, and inclusive future.

  • speaker photo
    Eric Peeters
    Senior Manager, Weaver

    Eric has more than 15 years of IT advisory and operations experience with significant knowledge of cloud services providers and users. He often works in complex, highly technical environments and consults with global cloud providers, Fortune 100 companies, private equity groups, start-ups, large pension fund managers, and state government entities. Eric’s experience linking technology environments to governance and compliance requirements enables him to advise clients on attaining and maintaining certifications and attestations over Payment Card Industry Data Security Standards (PCI DSS), Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR), ISO 27001, National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), and System and Organization Controls (SOC). He has also performed multiple internal audit and consulting engagements, managing acquisition or implementation of Enterprise Resource Planning (ERP) and large public administration software.

  • speaker photo
    Al Lindseth
    Principal, CI5O Advisory Services LLC
  • speaker photo
    Mary Chaney
    Chairwoman, CEO & President, Minorities in Cybersecurity, Inc.

    Mary N. Chaney, Esq., CISSP, CIPP/US has over 30 years of experience in Information Security, Privacy and Risk Management. She graduated from Xavier University with a B.S.B.A in Information Systems and became a licensed attorney in the State of Texas in 1999 after obtaining her J.D. from Texas Southern University - Thurgood Marshall School of Law.

    Ms. Chaney began her career journey by serving as a Special Agent for the FBI in Los Angeles before transitioning into executive level information security and privacy roles for GE Capital, J&J, Comcast, and Esperion Therapeutics.

    Ms. Chaney is the Chairwoman, CEO and President of Minorities in Cybersecurity, Inc. which focuses on support, leadership, and career development for women, non-binary and other minorities in cybersecurity and the Founder and CEO of its subsidiary MiC Talent Solutions, Inc. which focuses on placement of underrepresented talent.

    Ms. Chaney developed MiC and MiC Talent to create an ecosystem where underrepresented cybersecurity professionals can start, build, and grow their career, in addition to providing job opportunities from organizations vested in their success.

  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes