Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 25, 2023
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    9:00 am
    [PLUS Course] Real-World Cyber Risk Management and Resilience Planning
    • session level icon
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Key components covered include:

    1) Lifecycle for investigating and responding to a cyberattack (such as a ransomware attack)
    2) The legal, compliance, and regulatory issues that arise from such attacks
    3) Legal and regulatory requirements for cyber risk management programs
    4) Assessing and understanding the real-world business impact cyber risk has on the company
    5) Prioritizing risks and developing a strategic action plan to execute
    6) Implementing simple and cost-effective strategies that take into account legal, compliance, and regulatory requirements
    7) The role of cyber insurance in overall resilience and incident response preparation

  • Thursday, October 26, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am

    Participating professional associations and details to be announced.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Implications of ChatGPT and Other Similar AI Tools
    speaker photo
    CISO, Brink's Inc.
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    ChatGPT (Generative Pre-trained Transformer) is a language model developed by OpenAI. It is based on the Transformer architecture and is one of the largest and most powerful language models available today. ChatGPT has been pre-trained on massive amounts of text data and can generate human-like text in response to prompts given to it. ChatGPT, and other AI programs, have the potential to revolutionize the way we interact with technology and each other. With any new technology there are negatives and positives. Come ready to add to the discussion with your peers at this invitation-only breakfast meeting of the SecureWorld Dallas Advisory Council.
    8:00 am
    Supporting Victims of Cybercrime: The Cyber Helpline
    • session level icon
    speaker photo
    Director & Helpline Manager, The Cyber Helpline
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    The Cyber Helpline is a U.K. charity that supports over 2,000 victims of cybercrime every month by linking them with cybersecurity experts for free, professional help. The charity are delighted to be launching a pilot in the U.S. and to bring with them a wealth of expertise and knowledge to address a major gap and cybersecurity challenge in the States. Cybersecurity professionals are best placed to fill the gap in support for individuals experiencing cybercrime, but the impact, trends and the importance of giving safe advice means that it differs from “traditional” cybersecurity. Individuals facing cybercrime face unique challenges and require tailored support and expertise, which isn’t always available. This presentation provides an insight into the threats facing individuals in the online space, the impact it has on them, why the advice that you might give your friends and family could be inadvertently dangerous and how you can use your expertise and resources to make a difference in peoples lives with the skills you have, just by learning to apply them to a different audience. The session will allow for a Q&A to provide attendees with the chance to ask questions and understand more about this emerging career pathway and opportunities and responsibilities that their organizations have to support victims of cybercrime.
    9:00 am
    [Panel] Implications of ChatGPT and Other Similar AI Tools
    • session level icon
    speaker photo
    Chapter VP, (ISC)2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    speaker photo
    Chief Development Officer / Diversity & Inclusion Program Development, The Marcus Graham Project
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    ChatGPT (Generative Pre-trained Transformer) is a language model developed by OpenAI. It is based on the Transformer architecture and is one of the largest and most powerful language models available today. ChatGPT has been pre-trained on massive amounts of text data and can generate human-like text in response to prompts given to it. ChatGPT, and other AI programs, have the potential to revolutionize the way we interact with technology and each other. With any new technology there are negatives and positives. Let’s explore from the perspective of leaders in security, legal, marketing and cyberpsychology.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:15 am
    My System Can Kick Your System's @ss: Practical Lessons from the Military Weapons Systems Cybersecurity Trenches
    • session level icon
    speaker photo
    Fellow, Cyber Risk Assessment, Lockheed Martin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    How do you secure a system that doesn’t have firewalls, anti-virus, or other standard enterprise IT protection mechanisms? The vast majority of military aircraft was designed and developed before current standards cybersecurity and resiliency were first conceptualized. Additionally, these platforms frequently come with eclectic operating systems, programming systems, and hardware. Yet these systems must operate securely in cyber contested environments where the stakes are high. This presentation is a rare opportunity to vicariously experience some of the hardest challenges in military aviation and benefit from the lessons learned.
    10:15 am
    Special Delivery! Defending and Investigating Advanced Intrusions on Secure Email Gateways
    • session level icon
    speaker photo
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    In today’s enterprise environments, secure email gateways play a critical role in filtering and scrutinizing email content for potential threats. Positioned at the intersection between the public Internet and corporate email servers, these gateways become highly coveted targets for malicious actors. The recently disclosed vulnerability in the Barracuda Email Security Gateway (ESG), CVE-2023-28686, had a significant impact on organizations worldwide while providing a level of access to threat actors in an environment that significantly enabled their overall objectives.

    This talk dives into firsthand encounters from our investigations into these intrusions right from their infancy. The session provides an insightful walkthrough of the threat actors’ playbook and attack path, explore available logs and artifacts that aid in analysis, presents a comprehensive methodology to shed light on these malicious activities, and actionable remediation actions to reduce the attack surface. By the end of this session, attendees will be empowered to identify malicious activity within their secure email gateways and possess the necessary defense strategies to combat such threats.

    10:15 am
    Shift-Left, Shield Right: The Role of Real-Time CWPP in a CNAPP World
    • session level icon
    speaker photo
    Director, Product Marketing - Cloud, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    The cloud is big business, and so is increasingly targeted by threat actors. The challenge comes down to this: how do we secure our cloud-enabled business without throttling innovation? After all, no one went to the cloud to slow down. Join SentinelOne as we speak plainly about cloud defense in depth. From build time to runtime, we will discuss the complementary roles of agentless (“shift-left”) and agent-based (“shield right”) security layers. We will cover both CNAPP (Cloud-Native Application Protection Platforms) and real-time cloud workload protection (CWPP), sharing insights which hopefully help you to accelerate innovation while operating securely.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    11:10 am
    Using KPIs to Measure the 5 Pillars of Cyber Resilience
    • session level icon
    speaker photo
    Sr. Information Systems Auditor, Parkland Health & Hospital System
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Proper Key Performance Indicators and audit results are a sound base for measuring resilience. True resilience is about learning to be robust/strong enough against high dynamic threats. It is steadily improving your security measures/systems/infrastructure by measuring your resistance against a fast-changing environment. Come ready to hear how to build a solid cybersecurity foundation and increase resilience by performing a risk assessment with measurable controls.
    11:10 am
    [Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital Orchestra
    • session level icon
    Identifying the Current Threat Landscape
    speaker photo
    CISO, FUTU US Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.

    Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.

    Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.

    11:10 am
    The Future of AI in Security
    • session level icon
    speaker photo
    Senior Product Marketing Manager, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?

    Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?

    This discussion will explore:

    • The history of AI, ML, and automation already in your security stack
    • The dangers and challenges of unrestricted GPT and other chat bots as information sources
    • Ways humans and AI can work together
    12:00 pm
    [Lunch Keynote] Drag Racing & Cybersecurity: The Crossover
    • session level icon
    speaker photo
    CISO, United Musculoskeletal Partners
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    You’d be amazed what you can learn from everyday hobbies or obstacles to help you become a better practitioner. Krista Arndt shares a very personal story of survival after a bad drag racing accident in 2015. It was a life-altering experience and provided perspective on her personal and professional life that drives her every day as a loving mom and wife, volunteer, and successful CISO.
    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    The Next Generation of Cybersecurity Talent and Tools
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    The CISO is a fairly new designation in the grand scheme of executive leadership, with IT and security professionals stepping into the head information securing role in the past decade or so. First-generation CISOs put their years of experience in security and other IT-related roles to fill a much-needed role in the C-suite, with the all-important goal of protecting organizations from inside and outside cybersecurity threats. With the help of vendors and a myriad of tools, CISOs are fighting the good fight. CISOs should come ready to discuss who is “next up” and what succession plans are in place (or should be) for developing and nurturing next-gen cybersecurity talent. In addition, come ready to discuss what tools you as a cybersecurity professional are deploying to secure your organization, and to hear from supporting vendors what they have to offer and how they are at the ready to assist in the effort.
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    [Panel] Cover Your Cyber Assets
    • session level icon
    speaker photo
    Director, Cyber Underwriting, Safety National
    speaker photo
    Chief Claims Officer, Cowbell Cyber
    speaker photo
    Consultant, Cyber Risk Solutions Team, WTW
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    What will drive the next big wave of information security improvements at U.S. organizations? Instead of regulation, it may be insurance. A two-pronged evolution is underway. Insurance policies are suddenly becoming more prescriptive for organizations, often requiring companies meet certain cybersecurity benchmarks before a policy can be written. At the same time, “InsureTech” is emerging on the scene. This involves a new breed of insurance company that provides cyber coverage and also scans the insured’s environment to constantly monitor for IT and cyber risk. Join this keynote panel as we discuss this evolution and look at future impacts of cyber insurance on security leaders and their teams.
    1:15 pm
    Chief Scapegoat Officer Perspective
    • session level icon
    speaker photo
    Executive Director, Americas Region, CREST
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Join industry veteran Tom Brennan, with 30 years of industry insights from running enterprise organizations, teams, and securing what matters most. He provides important considerations to reduce your attack surface, digesting threat intelligence and powerful solutions. The session also has an interactive component, so come prepared to play a game and collaborate!
    1:15 pm
    Cyber-Enabled Fraud and Business Email Compromise in 2023
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    This presentation focuses on the BEC fraud playbook and shows how technical advancements and applications have reduced the red flags and defenses against cyber fraud, allowing threat actors to increase the efficacy of their attacks. Get an insider’s view of what it’s like to fight against the bad actors as they grow more sophisticated, especially with the help of AI.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:30 pm
    Continuous Monitoring: Staying Ahead of the Game
    • session level icon
    speaker photo
    Senior Manager, Weaver
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    With security threats and technology constantly evolving at a high pace, organizations cannot afford to wait for the annual third-party report to find out where compliance and security issues lie. To close the gap, more and more organizations are implementing a Continuous Monitoring program supported by automation tools to gain early insights as to where weaknesses may exist in their security posture. A good program uncovers findings without waiting on internal or external audits, give teams additional time to plan remediation, and helps keep up with the evolution of security threats around the environment, and that’s before automation is even implemented!

    Objectives of this panel presentation include sharing:

    • The key components to designing an effective Continuous Monitoring program
    • Whether and when to implement automation to support the program
    • Key considerations to determine whether to run the program in-house or outsource it
    2:30 pm
    Effectively Communicating Risk to the Board
    • session level icon
    speaker photo
    Principal, CI5O Advisory Services LLC
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Session description to come.

    2:30 pm
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [Closing Keynote] Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn Soles
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater
    In a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.
Exhibitors
  • Association of Continuity Professionals (ACP) North Texas
    Booth: TBD

    ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.

    Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week.  We invite you to attend our next meeting.

  • Bitdefender
    Booth: TBD

    Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.

    From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.

  • CREST
    Booth: TBD

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Envision Technology Advisors
    Booth: TBD

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • Exabeam
    Booth: TBD

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Horizon3.ai
    Booth: TBD

    Horizon3.ai’s mission is to help you find and fix attack vectors before attackers can exploit them. NodeZero, our autonomous penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces.

    Like APTs, ransomware, and other threat actors, our algorithms discover and fingerprint your attack surface, identifying the ways exploitable vulnerabilities, misconfigurations, harvested credentials, and dangerous product defaults can be chained together to facilitate a compromise.

    NodeZero is a true self-service SaaS offering that is safe to run in production and requires no persistent or credentialed agents. You will see your enterprise through the eyes of the attacker, identify your ineffective security controls, and ensure your limited resources are spent fixing problems that can actually be exploited.

  • (ISC)2 Dallas-Fort Worth
    Booth: TBD

    The Dallas-Fort Worth Chapter of (ISC)2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from (ISC)2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

  • InfraGard North Texas
    Booth: TBD

    The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:

    • Local quarterly membership meetings focused on infrastructure protection
    • Sector-specific meetings and information exchanges (see Sector Chief Program).
    • Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
    • Networking opportunities with peers within and across all sectors
  • Mandiant, now part of Google Cloud
    Booth: TBD

    Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

  • Minorities in Cybersecurity
    Booth: TBD

    Minorities in Cybersecurity (MiC) was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field. It is our mission to provide practical knowledge, training, development, and support to our members with the sole purpose of preparing them to become the next generation of global cybersecurity leaders.

    The vision for MiC is to provide a community for underrepresented talent where they can find much needed leadership development and training opportunities to assist them on their cybersecurity career journey.

  • North Texas ISSA
    Booth: TBD

    The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.

  • Ping Identity + MajorKey Technologies
    Booth: TBD

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

    MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP. We provide Advisory, Integration, and Managed Services for Identity and Access Management, Application Deployment and Security, Data Security and Governance, and Cloud Security. Delivering at the speed of business to protect our client’s identities, apps, data, and systems without hampering their agility. For more information, go to majorkeytech.com.

  • Probely
    Booth: TBD

    Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs.

    Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle.

    With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them.

  • SecureEnds
    Booth: TBD
  • SentinelOne
    Booth: TBD

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Cyber Fraud Task Force – U.S. Secret Service
    Booth: TBD

    Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • Veeam Software
    Booth: TBD

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • WiCyS Dallas Forth Worth Affiliate
    Booth: TBD
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Shawn E. Tuma, Instructor
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Patrick Benoit, Moderator
    CISO, Brink's Inc.

    Patrick was previosuly the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. He has demonstrated repeated success guiding business strategy to achieve maximum positive business impacts with minimum resource expenditures. Talented at building and launching global technology and security programs, grooming high-performing teams across all domains, plus guiding the digital transformation, enhancing the digital customer experience, driving and enhancing revenue using technology and reducing risk to the business. A skilled executive leader, presenter, negotiator, and businessperson, able to forge solid relationships with strategic partners and build consensus across multiple organizational levels.

    He is certified as C/CISO, CISM, CISSP, CRISC, PMP, ITIL Expert, and Lean Six Sigma Black Belt. He is a pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and his favorite teaching is “From Chaos Comes Greatness,” a loose translation from the “I Ching."

  • speaker photo
    Charlotte Hooper
    Director & Helpline Manager, The Cyber Helpline
  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, (ISC)2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Shawn E. Tuma
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Larry Yarrell, II
    Chief Development Officer / Diversity & Inclusion Program Development, The Marcus Graham Project
  • speaker photo
    Teresa Merklin
    Fellow, Cyber Risk Assessment, Lockheed Martin

    Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.

  • speaker photo
    Nader Zaveri
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud

    Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states. He also leads the remediation efforts with his knowledge and experience by providing strategic short, medium, and long-term remediation recommendations to directors and C-level executives. He also leads the efforts in providing tactical recommendations to specialists, to improve the security posture of an organization. Nader also has experience with leading transformational projects over infrastructure and processes with technical and organizational change components in response to rapidly evolving business needs and regulatory requirements. Nader Zaveri conducted interviews and presentations for dozens of organizations and conferences regarding cloud and on-prem Incident Response and Remediation topics. He regularly provides security updates and briefings to C-Suite personnel during and after an incident, as well as assists with post-remediation and hardening efforts for the organization. Prior to joining Mandiant, Nader Zaveri spent several years in leadership positions at major cyber security consulting firms. Before joining consulting, Nader worked as a lead practitioner for multi-national organizations. When Nader is not working, he is helping and mentoring young professionals with their entry into the workforce and Cyber Security. Nader juggles about 5-10 mentees at a time to help them navigate their studies and career paths.

  • speaker photo
    Rick Bosworth
    Director, Product Marketing - Cloud, SentinelOne

    Rick Bosworth is an engineer turned product manager and marketer, bringing an uncommon technical perspective to enterprise GTM strategy and execution for almost two decades. At SentinelOne, his focus in cybersecurity—in particular cloud workloads, IoT, and user endpoint security—has provided expertise to the rapidly-evolving challenges across multiple fronts.

  • speaker photo
    Michael R. Smith
    Sr. Information Systems Auditor, Parkland Health & Hospital System

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    Industry Certifications, Licensure, & Training
    Certified Information Security Specialist (CISSP)
    Certified Internal Auditor (CIA)
    Project Management Professional (PMP)
    Certified Fraud Examiner (CFE)
    Certified Information Systems Auditor (CISA)
    Information Library Information Technology (ITIL)

  • speaker photo
    William Floyd, Moderator
    CISO, FUTU US Inc.
  • speaker photo
    Panel Discussion
  • speaker photo
    Cynthia Gonzalez
    Senior Product Marketing Manager, Exabeam

    Cynthia Gonzalez is a Sr. Product Marketing Manager at Exabeam. An advocate for customers, she’s focused on their use of technology to enable and simplify work. She is at her best when bridging the gap between sophisticated software products and the benefits customers can expect.

  • speaker photo
    Krista Arndt
    CISO, United Musculoskeletal Partners

    Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security program in alignment with the business objectives. Additionally, Krista provides oversight of the security program's day to day operational effectiveness.

    Prior to joining UMP, Krista served as the Director of Security Governance, Risk and Compliance for Voyager Digital, a leading cryptocurrency trading platform, where she was responsible for the development, maturation, and maintenance of Voyager's security program. Krista has served in various leadership and operational roles within the information security profession for 14 years within the financial and defense sectors, bringing a deep understanding of how strong security and privacy practices can help enable best in class care and peace of mind for UMP and its practices' patients.

    Krista has a Bachelors Degree in Biology from Felician College and currently holds her Certified in Risk and Information Systems Control (CRISC) and Certified Information Security Manager (CISM) certifications.

    Krista is an active member of ISACA, Infragard's Philadelphia Chapter, as a member of both Neumann University's Business Advisory Council and Women in Cybersecurity-Delaware Valley Affiliate's Membership and Education Committees. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

  • speaker photo
    Kip Boyle, Moderator
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Steven H. Anderson
    Director, Cyber Underwriting, Safety National

    Steve is a cyber liability product leader and underwriter with almost 30 years of experience in both the insurance and technology sectors. In his current role Steve helps drive premium growth through leading operations, product development and underwriting at Safety National. Steve previously served as Chief Underwriting Officer at Measured Insurance and Vice President – Product Leader at QBE North America.

    Steve is a subject matter expert and national speaker on the topic of cyber liability.

  • speaker photo
    Theresa Le
    Chief Claims Officer, Cowbell Cyber

    Theresa Le is Chief Claims Officer at Cowbell Cyber, the leading provider of standalone cyber insurance for small and medium-sized enterprises. At Cowbell, she leads the team of cyber claims specialists and risk engineers who work tirelessly to minimize the frequency and severity of cyber incidents. Theresa brings nearly 20 years of cyber claim and insurance coverage experience to her role at Cowbell. Previously, she served as Vice President, Cyber Claims Expert at Swiss Re and prior, Theresa spent over a decade counseling domestic cyber insurers and London market syndicates on cyber coverage and wording, data breach and crisis management, dispute resolution strategies, and business impact of privacy and cyber liability. Theresa’s robust cyber background is also complemented by her experience as Senior Counsel at Clyde & Co, Atheria Law, and Duane Morris.

  • speaker photo
    Sean Scranton
    Consultant, Cyber Risk Solutions Team, WTW

    Cyber Liability National Practice Leader (current). IT Security / IT Auditor at RLI for eight years. Network / security consulting / auditor for financial institutions, government for nine years. Network / firewall administrator in healthcare for seven years. Designations: CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA.

  • speaker photo
    Shawn E. Tuma
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Tom Brennan
    Executive Director, Americas Region, CREST

    Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrastructure Security Agency’s 16 critical infrastructure sectors which are vital to U.S. security, national economy, and public health and safety. As CREST USA Chairman, Brennan spearheads strategic plans for CREST USA’s organizational growth while also serving as an industry evangelist and educator on the value of using accredited cybersecurity products and professionals to improve consumer privacy, security, and protection worldwide.

    As a proud U.S. Marine veteran, Brennan became involved with CREST International in 2016 while serving the Global Board of Directors for the Open Web Application Security Project (OWASP). Seeing similar goals, he became more active in the CREST organization and was nominated to lead the organization’s U.S. Advisory in 2019. Over his career, Brennan has amassed security expertise across the cybersecurity spectrum, including penetration testing, vulnerability assessment, application security, threat intelligence, and more. In addition to being CREST USA Chairman, he is the Chief Information Officer of the national law firm Mandelbaum Barrett, overseeing critical infrastructure, privacy, and security operations. He is also an Advisory Board Member of the information services advisory Gerson Lehrman Group, a Cyber Fellows Advisory Council Member, a Member of the Information Technology Advisory Committee of the County College of Morris, a Senior Advisor and Industry Advisory Board Member of the New Jersey Institute of Technology, and a Cyber Fellows Advisory Council Member of the NYU Tandon School of Engineering.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Eric Peeters
    Senior Manager, Weaver

    Eric has more than 15 years of IT advisory and operations experience with significant knowledge of cloud services providers and users. He often works in complex, highly technical environments and consults with global cloud providers, Fortune 100 companies, private equity groups, start-ups, large pension fund managers, and state government entities. Eric’s experience linking technology environments to governance and compliance requirements enables him to advise clients on attaining and maintaining certifications and attestations over Payment Card Industry Data Security Standards (PCI DSS), Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR), ISO 27001, National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), and System and Organization Controls (SOC). He has also performed multiple internal audit and consulting engagements, managing acquisition or implementation of Enterprise Resource Planning (ERP) and large public administration software.

  • speaker photo
    Al Lindseth
    Principal, CI5O Advisory Services LLC
  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Grow in person!

Join your regional cybersecurity community for learning and professional growth. Sign up today!