googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 2, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Hillhaven

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, October 3, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    The Vital Importance of Cyber Risk Governance and Business Continuity
    speaker photo
    Associate Director, Network Security, Verizon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Spring Glade

    Join your CISO peers for an engaging roundtable discussion on the critical intersection of cyber risk governance and business continuity planning. This interactive session for Advisory Council members and select VIPs provides a forum for security leaders to share experiences, challenges, and best practices in aligning cybersecurity strategies with organizational resilience. Key discussion points may include:

    • Integrating cybersecurity considerations into enterprise-wide business continuity plans
    • Strategies for effective communication of cyber risks to boards and executive leadership
    • Lessons learned from recent high-profile cyber incidents and their impact on business continuity
    • Emerging technologies and their role in enhancing cyber resilience and business continuity
    8:00 am
    The Rise of Bossware: A Privacy Paradox
    • session level icon
    speaker photo
    Sr. Information Systems Auditor, Parkland Health
    Registration Level:
    • session level iconConference Pass
    8:00 am - 8:45 am
    Location / Room: Sunny Slope

    The rise of “bossware” has surged due to remote work. Employers seek insights into productivity, security, and compliance. These concerns resulted in a privacy paradox: bossware provides valuable data but raises crucial privacy concerns that center around balancing surveillance with employee rights. Bossware features include keystroke logging, screen recording, and webcam activation increase the risk of trust erosion, legal implications, and employee morale. Transparency and informed consent are essential elements of navigating the Legal Landscape with data protection laws (GDPR, CCPA, etc.).

    This presentation provides ideas on best practices for achieving transparent communication by educating employees about monitoring, achieving privacy by design by implementing privacy-friendly bossware, and the importance of regular audits to assess the impact and effectiveness of the bossware implementation. Security professionals must address the bossware dilemma strategically. This session helps find the sweet spot where smart security meets employee trust, ensuring a productive and respectful work environment.

    8:00 am
    Cyversity North Texas Chapter Meeting: A Meet and Greet
    • session level icon
    Open to all attendees
    speaker photo
    Vice President/Chapter Leader, Cyversity
    speaker photo
    Vice President/Chapter Leader, Cyversity
    speaker photo
    President, Cyversity North Texas Chapter
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Fairview

    Come meet the leadership and other members of the Cyversity North Texas Chapter and learn about the mission to achieve the consistent representation of women, underrepresented communities, and all veterans in the cybersecurity industry through programs designed to diversify, educate, and empower.

    8:00 am
    BlackGirlsHack Meeting [Open to all attendees]
    • session level icon
    Offensive AI: The Future of Red Teaming
    speaker photo
    Founder & Executive Director, BlackGirlsHack
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Northbrook I, II, III

    In today’s evolving threat landscape security professionals must stay ahead by adopting innovative tools and methodologies. This talk, given by the founder of the international cybersecurity nonprofit BlackGirlsHack, delves into the intersection of Python, artificial intelligence, and network security by demonstrating a customized security tool for exploring reconnaissance and resource development vulnerabilities within the MITRE ATT&CK framework.

    During the session, we will examine how the tool leverages Python and ChatGPT’s capabilities to streamline reconnaissance and resource development tactics, enhancing the effectiveness of penetration testing exercises. The talk will provide insights into integrating artificial intelligence, particularly ChatGPT, to augment the tool’s capabilities, enabling testers to focus their efforts more efficiently.

    Attendees will witness a live demonstration showcasing the practical application of HackingBudy in conducting external network penetration tests, leveraging the MITRE ATT&CK framework. We will also discuss scenarios where artificial intelligence can be leveraged to optimize testing strategies, ultimately bolstering cybersecurity defenses.

    By the end of the talk, participants will understand how artificial intelligence can be harnessed to enhance penetration testing efforts, thereby fortifying their organizations against emerging cyber threats.

    8:00 am
    InfraGard North Texas Members Alliance: New Member Orientation
    • session level icon
    Open to all attendees
    speaker photo
    Special Agent, FBI
    speaker photo
    AVP, InfraGard North Texas Members Alliance
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Keynote Theater

    The InfraGard North Texas Members Alliance welcomes SecureWorld’s attendees in joining us for our new membership orientation. You will learn about the history of InfraGard, what InfraGard is, how InfraGard can benefit you and the North Texas community, and much more. Our goal for this presentation is to ensure that everyone feels well-informed and empowered to make the most out of their membership. And don’t miss our special guest, Special Agent Kevin Minor of the FBI!

    We encourage everyone to ask questions, engage actively during the meeting, and learn about the InfraGard resources that will now be available with your new membership access. This meeting is open to anyone interested in learning more about InfraGard North Texas and possibly joining.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] The Hidden Costs of Cybersecurity: Unveiling the True Price of Protection
    • session level icon
    speaker photo
    CISO, City of Arlington
    speaker photo
    Deputy CISO, Toyota Financial Savings Bank
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    With cyber threats evolving at an unprecedented pace, organizations are increasingly aware of the need for robust cybersecurity measures. However, the true cost of cybersecurity extends far beyond the visible expenses of software licenses and security personnel. This keynote panel delves into the often-overlooked aspects of cybersecurity that can significantly impact an organization’s bottom line and operational efficiency. The panel explores:

    • The multifaceted nature of cybersecurity costs, beginning with the critical yet often underestimated areas of incident response (IR) readiness and preparedness.
    • The importance of comprehensive business continuity planning, highlighting how inadequate planning can lead to substantial financial losses and reputational damage. The panel cites real-world examples, including the recent CrowdStrike outage, to illustrate the cascading effects of service disruptions on both providers and their clients.
    • The legal aspects of cybersecurity, exploring how regulatory compliance, potential liabilities, and the cost of legal counsel in the aftermath of a breach contribute to the hidden costs of security. Don’t forget the often-underestimated impact of third-party risk and the importance of robust vendor management practices.
    • How to challenge the conventional wisdom of relying heavily on a single security vendor, advocating for a diversified approach that can enhance resilience and reduce dependency risks. The panel also addresses the counterintuitive problem of implementing too many security controls, which can paradoxically slow recovery efforts after an incident and increase operational complexity.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    The Dark Side of AI: Using AI to Enable Attacks
    • session level icon
    speaker photo
    Sr. Security Researcher, Nokia
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Fairview

    Due to the rise of generative AI, AI has become more accessible to the public. Therefore, more and more people are using AI to perform various tasks. Unfortunately, although AI can be used for many good things such as powerful data analytics, criminals are using AI to help them perform various attacks from generating more convincing phishing emails to stealing passwords. In this presentation, learn about the different techniques that criminals are using to attack systems with the help of AI, and discuss what organizations and individuals can do to prepare and protect themselves from this threat.

    10:15 am
    How TIAA Is Addressing the Cybersecurity Skill Shortage Internally
    • session level icon
    speaker photo
    Sr. Lead Information Security Business Manager, TIAA
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Sunny Slope

    This presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.

    10:15 am
    Building a Strong Defense with PCI Compliance
    • session level icon
    speaker photo
    Partner, IT Advisory, Weaver
    speaker photo
    Partner, Cybersecurity Services, Weaver
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Northbrook I, II, III

    As the cybersecurity landscape evolves, the associated PCI requirements supporting those security considerations are also changing. Is your organization well positioned to adapt to the updated guidance issued with version 4.0.1 and the upcoming implementation deadlines for the March 31, 2025, requirements? This presentation explores the essential quick wins for payment card security and PCI compliance related to the new version, 4.0.1, and how to best guard your cardholder data without committing the whole IT team defensive line to compliance-related tasks.

    Key topics include:

    • Rule Changes: Updates to PCI DSS in version 4.0.1
    • Game Footage: Common High-Risk Misses
    • Away Games: Future Dated (2025) Requirements
    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Instrumenting Your Security Program
    • session level icon
    speaker photo
    CISO, Health Care Service Corporation
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Fairview

    With the foundation of how the aviation industry has achieved very high safety records, you will learn a new perspective on how to instrument your information security program to reduce risk. This is NOT a presentation about what metrics you should measure, but a framework for identifying meaningful metrics and, more importantly, how to use them to ensure effective attack surface management at scale, moving past compliance and into operational excellence.

    11:10 am
    The New Privacy Landscape in Texas and Beyond
    • session level icon
    speaker photo
    Data Privacy & Cyber Partner, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Sunny Slope

    “Everything is bigger in Texas,” and that now includes privacy protections. Texas has rolled out its version of a comprehensive privacy law that aims to reshape data privacy and security in the Lone Star State. This discussion unpacks key changes and compliance tips ushered in by this legislation, detailing implications for businesses and individuals. Learn about key consumer rights, data handling obligations, and compliance strategies to avoid violations.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Solutions Architect, Aqua Security
    speaker photo
    Digital Security Consultant, Americas DPS, Entrust
    speaker photo
    MySQL Master Solutions Engineer, Oracle
    speaker photo
    Former CIO/CISO, FUTU US Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Northbrook I, II, III

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] One Thing Leads to Another: Lessons in Enterprise Cyber Resilience from DoD Aviation Cybersecurity and a Popular Song from the '80s
    • session level icon
    speaker photo
    Cyber Fellow, Aeronautics Cyber Range, Lockheed Martin
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The quintessential ’80s music track “One Thing Leads to Another” by The Fixx doesn’t just blend a catchy melody, sharp lyrics, and an energetic and distinctive sound; it also foreshadowed emerging concepts of cyber resilience. This session examines enterprise IT cybersecurity through the unique lens of DoD aviation platforms as informed by this iconic song.

    Military aircraft that operate in cyber-contested environments face cyber threats from highly capable nation-state adversaries. That experience has yielded battle-tested insights and strategies that are directly applicable for those who defend traditional commercial networks. Today’s nation-state exploits become tomorrow’s script-kiddie tools, so you don’t want to miss this rare opportunity to gaze into the future.

    12:00 pm
    Advisory Council Lunch Roundtable (VIP / Invite Only)
    • session level icon
    How to Secure Your Organization from Internal and External Identity-Based Threats
    speaker photo
    Vice President, Gurucul
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Spring Glade

    Do you know if a threat is an Insider Risk or a Compromised Identity? Securing your organization from identity-based threats is paramount to reducing cyber risk. Security operations teams need the tools to help them quickly determine if they are dealing with a true insider threat or a compromised account. It’s important to link identity, access and activity to achieve clarity about gaps and risks that insider or external threat actors can exploit. In this closed-door, peer-to-peer discussion, we will discuss ways to combat these threats, reduce the attack surface, manage risk, and protect your enterprise.

    Advisory Council roundtable discussion moderated by:

     

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Integrate Transformative OT Cybersecurity Programs to Increase Effectiveness
    • session level icon
    speaker photo
    Principal, CI5O Advisory Services LLC
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Fairview

    At the operational field, plant, or edge level, growing risks like cybersecurity must be managed amid a need to democratize and expand technology within an increasingly connected workplace. Traditional approaches of handling cyber, analytics, edge, and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results. Operational management frameworks are designed to provide consistency and reliability at the field level for various reasons, including safety and environmental priorities, and can create friction with innovative techniques and large-scale change. Culture clashes between OT, IT, and Operations teams and priorities worsen this situation.

    It’s important to appreciate how transformative OT cybersecurity programs are in order to integrate those objectives and ways of working into existing frameworks. This also allows cybersecurity teams to take advantage of new models and emerging technology which can accelerate progress. Finding and supporting these solutions is not enough though; companies need to apply a different approach to leading their internal change to overcome resistance and improve engagement.

    1:15 pm
    Navigating the Cybersecurity Maze in M&A: A CISO's Perspective on Integration Challenges
    • session level icon
    speaker photo
    SVP & CISO, Sunflower Bank, N.A.
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Sunny Slope

    This session explores the critical cybersecurity challenges faced by CISOs during mergers and acquisitions from the acquiring company’s viewpoint. Just days after Legal Day 1 of a merger, Parrish will delve into the complexities of integrating disparate security cultures, technologies, and practices while maintaining a robust security posture throughout the M&A process. Key topics include assessing the target company’s security landscape, managing risk during transition, and strategies for harmonizing security policies and controls. Special attention will be given to the intricate task of consolidating third-party vendor relationships and associated risks. Gain practical insights on fostering a unified security culture, streamlining technologies, and ensuring compliance across the newly formed entity.

    1:15 pm
    [Panel] Elevating Security Through Threat Intelligence, Cloud Resilience, and AI Innovations
    • session level icon
    speaker photo
    Security Architect, Varonis
    speaker photo
    CEO, Envision Technology Advisors
    speaker photo
    Director, KMicro Tech
    speaker photo
    Partner, IT Advisory, Weaver
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Northbrook I, II, III

    Staying ahead requires a proactive and multifaceted approach in an era of increasingly sophisticated cyberattacks. This expert panel will explore how organizations can elevate their cybersecurity posture by leveraging advanced threat intelligence, building cloud resilience, and integrating AI-driven innovations.

    Discover how threat intelligence is evolving to offer more predictive and actionable insights, how cloud resilience strategies are vital for safeguarding critical infrastructure, and how cutting-edge AI tools can automate detection, response, and even decision-making in the fight against emerging threats.

    Join us for an in-depth discussion on how these critical components work together to form a stronger, smarter, and more adaptive security ecosystem.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Navigating Third-Party Risk and Vendor Resilience
    • session level icon
    speaker photo
    SVP, South Central Zone Regional Manager, Cyber Practice, Marsh
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Sunny Slope

    In today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.

    To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.

    2:10 pm
    Integrating Threat Intelligence with Penetration Testing: A Simulation-Driven Approach to Cyber Resilience
    • session level icon
    speaker photo
    Sr. Threat Intel Analyst, Fortune 500 Convenience Retail
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Northbrook I, II, III
    This presentation explores the integration of attack simulation tools with real-time threat intelligence to mimic sophisticated cyberattacks accurately. It highlights adaptive threat modeling, automation in penetration testing, and the role of machine learning in predicting and automating testing processes. The discussion emphasizes the enhancements in security postures, incident response, and resource allocation, alongside addressing challenges like scaling simulations and reducing false positives. It concludes with future trends in leveraging AI for advancing penetration testing and threat intelligence, offering a blend of technical depth and strategic insights for an audience keen on both practical and theoretical aspects of cybersecurity.
    2:10 pm
    Loaves and Phishes: Establishing Purpose in the Nebulous and Evolving Terrain of Cybersecurity
    • session level icon
    speaker photo
    Commissioner, City of Austin's Community Technology and Telecommunications Commission
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Fairview

    After spending time in the Army, Gabriel began to transition into the cybersecurity sector, safeguarding digital infrastructures against evolving threats. He felt a calling to serve his country in a more direct and tangible manner. The decision to transition was not easy, as it required leaving behind a guaranteed path for the unknown challenges of civilian life. However, he was driven by a desire to apply his expertise in a different context, one where the stakes were even higher, and the impact more immediate.

    During this journey, he encountered various challenges, from adapting to the rigorous physical training regimen to learning the intricacies of security protocol. Yet, through perseverance and a willingness to learn, he was able to overcome these obstacles and find his footing in this new environment. This experience taught him the importance of adaptability and resilience, qualities that are as crucial in the military as they are in the ever-changing landscape of cybersecurity.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Sponsored by Envision Technology Advisors
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    Generously sponsored by:

    3:30 pm
    [Closing Keynote] Cyber World on Fire: Global Digital War's Impact on Governments, Societies
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    In this eye-opening keynote loaded with an insider’s perspective on the latest developments in the Global Cyber War, hear how the Ukraine-Russia and Israel-Hamas wars and continual attacks from nation-states on entities across the globe are impacting governments and societies around the world. Weaving together the latest cyber intelligence with current military, diplomatic, government, and corporate developments, Col. Leighton assesses current efforts to counter bad actors and charts a path forward as the good guys and gals rush headlong into a cyber world heavily influenced by the dawn of AI and other game-changing technologies.

Exhibitors
  • Aqua Security
    Booth: 320

    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

  • BlackGirlsHack
    Booth: TBD

    We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.

    The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.

    BlackGirlsHack is open to all!

  • Cato Networks
    Booth: 360

    Cato Networks pioneered the convergence of networking and security into the cloud. Aligned with Gartner’s Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks, Cato’s vision is to deliver a next generation secure network architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Our cloud-native architecture enables Cato to rapidly deploy new capabilities and maintain optimum security posture, without any effort from the IT teams. With Cato, your IT organization and your business are ready for whatever comes next. For more information, visit https://www.catonetworks.com.

  • Cyversity North Texas
    Booth: TBD

    Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.

  • Data Theorem
    Booth: 120

    Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. Data Theorem is headquartered in Palo Alto, Calif., with offices in New York, Paris, France, and Bangalore, India.

  • Endace
    Booth: 310

    Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.

  • Entrust
    Booth: 100

    Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

  • Envision Technology Advisors
    Booth: 270

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • Gurucul
    Booth: 340

    Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Cloud-native Next-Gen Security Analytics and Operations Platform provides customers with Next Generation SIEM, UEBA, Open XDR, and Identity & Access Analytics. It leverages machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent data breaches, fraud and insider threats. It also reduces the attack surface for accounts and eliminates unnecessary access rights and privileges to increase data protection.

    Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cybersecurity. The company was founded in 2010 by seasoned entrepreneurs with a proven track record of introducing industry-changing enterprise security solutions. Gurucul’s mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

    Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise. It is also used for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. Gurucul is headquartered in Los Angeles, CA.

  • Hunters
    Booth: 330
    Hunters SOC Platform transforms security ops with AI and automation, providing a superior alternative to traditional SIEM systems. It streamlines threat detection and auto-investigation, empowering analysts with deeper insights and efficiency.

     

  • Illumio
    Booth: 110

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • Keysight
    Booth: 210

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • KMicro Tech, Inc.
    Booth: 250

    KMicro Tech Inc. provides a suite of scalable IT managed services combining streamlined cloud and on premise solutions that are specific to the needs of our enterprise customers. We enable our clients to focus on their business and not IT. We do that by working closely with our clients to understand their business and help them navigate through information technology so their companies are positioned to thrive in today’s competitive marketplace.

  • InfraGard North Texas Members Alliance
    Booth: TBD

    The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:

    • Local quarterly membership meetings focused on infrastructure protection
    • Sector-specific meetings and information exchanges (see Sector Chief Program).
    • Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
    • Networking opportunities with peers within and across all sectors
  • ISC2 Dallas-Fort Worth Chapter
    Booth: TBD

    The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

  • Association of Continuity Professionals (ACP) North Texas
    Booth: TBD

    ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.

    Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week.  We invite you to attend our next meeting.

  • North Texas ISSA
    Booth: TBD

    The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.

  • Okta
    Booth: 280

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • MySQL
    Booth: 200

    MySQL Enterprise Edition includes the most comprehensive set of advanced features, management tools and technical support to achieve the highest levels of MySQL scalability, security, reliability, and uptime. It reduces the risk, cost, and complexity in developing, deploying, and managing business-critical MySQL applications.

  • Pure Storage, Inc.
    Booth: 300

    Pure Storage is pioneering a new class of enterprise storage that has been designed from the ground up to take full advantage of flash memory. The company’s products accelerate random I/O-intensive applications like server virtualization, desktop virtualization (VDI), database (OLTP, rich analytics/OLAP, SQL, NoSQL), and cloudcomputing.

    Pure Storage makes it cost-effective to broadly deploy flash within the data center, enabling organizations to manage growth within existing power and space constraints. Launching later this year, the company’s products are in private beta with select customers. Pure Storage is funded by Greylock Partners and Sutter Hill Ventures.

  • ThreatLocker
    Booth: 220

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Varonis
    Booth: 260

    Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

  • WiCyS Dallas Forth Worth Affiliate
    Booth: TBD
  • ZeroFox
    Booth: 350

    Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.

    Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Tianne Strombeck, Moderator
    Associate Director, Network Security, Verizon

    Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has worked with the network teams to imbed security requirements into their new development and operating processes.

  • speaker photo
    Michael R. Smith
    Sr. Information Systems Auditor, Parkland Health

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    Industry Certifications, Licensure, & Training
    Certified Information Security Specialist (CISSP)
    Certified Internal Auditor (CIA)
    Project Management Professional (PMP)
    Certified Fraud Examiner (CFE)
    Certified Information Systems Auditor (CISA)
    Information Library Information Technology (ITIL)

  • speaker photo
    Robert Cowans
    Vice President/Chapter Leader, Cyversity

    Robert Cowans is a seasoned professional with a diverse background and a proven track record of success in various industries. Throughout his career in the United States Army, Dep. Of Homeland Security, and American Airlines. He has held numerous positions in leading organizations, where he has consistently demonstrated his ability to drive growth and deliver results.

    In addition to his professional accomplishments, Robert is known for his commitment to giving back to the community. Throughout his career, he has actively supported organizations such as Protect.org: Human Exploitation Rescue Operative (H.E.R.O. Corps) and a Cyversity as an Ambassador, leveraging his skills and expertise to make a positive impact.

    Robert holds a bachelor’s degree in Computer Forensics and Digital Investigations from Champlain College and has continued to invest in his professional development through various certifications and industry-related courses. He stays abreast of the latest trends and best practices, ensuring that he remains at the forefront of his field.

  • speaker photo
    Saleem Khan
    Vice President/Chapter Leader, Cyversity

    Saleem Khan is a seasoned IT security leader with over 20 years of experience in enhancing organizational cybersecurity and aligning it with business objectives. His impressive career spans roles at ServiceNow, Emory University, AT&T, and The Coca-Cola Company, where he excelled in IT risk management and GRC processes. Known for his strategic vision and empathetic leadership, Saleem is a trusted advisor to executives and stakeholders.

    He holds an Executive MBA from Georgia Tech, a BS in Computer Engineering from LSU, and certifications including CISA and Scrum Master. Saleem's expertise in bridging technical complexities with business strategy continues to drive innovation in cybersecurity.

  • speaker photo
    Renaldo McKenzie, Host
    President, Cyversity North Texas Chapter

    Renaldo McKenzie is a seasoned professional & cybersecurity leader with a diverse background of proven success in various industries and critical sectors such as Information Technology, Healthcare, Communications, Financial, Transportation, and Government.

    His knowledge and expertise are in program development, management, and advancement of Governance, Risk, and Compliance, Identity & Access Management, Security Operations, and Security Awareness Education & Training where he has successfully developed, managed, and transformed several organizational security programs through collaborative stakeholder engagement to drive change, align with business objectives, and scalability.

    Renaldo conducted his studies at Navarro College and The University of Texas at Arlington and has continued his professional development & education through various courses, certifications, and hands on engagements.
    In addition to his professional experience, Renaldo is known for often giving back to the community by serving as an advisor, mentor, and ambassador for several individuals and organizations.

  • speaker photo
    Tennisha Martin
    Founder & Executive Director, BlackGirlsHack

    Tennisha Martin is the Founder and Executive Director of BlackGirlsHack (BGH Foundation), a national cybersecurity nonprofit organization dedicated to providing education and resources to underserved communities and increasing the diversity in cyber. She has worked in a consulting capacity for more than 15 years and in her spare time is a CEO, best-selling author, award-winning hacker, mentor, penetration tester, and advocate for diversity.

  • speaker photo
    Kevin Minor, Guest Speaker
    Special Agent, FBI
  • speaker photo
    Maria Scarmardo, Host
    AVP, InfraGard North Texas Members Alliance
  • speaker photo
    Bryce Carter
    CISO, City of Arlington

    Bryce Carter is a nationally-recognized leader known for his transformative impact on organizational culture and his ability drive cybersecurity as a key business enabler. Bryce has not only developed groundbreaking security strategies that safeguard data, but has also focused on the broader welfare of communities. His visionary approach has earned him positions on multiple advisory boards, where he helps shapes next-generation policies and technologies. In addition, Bryce contributes to the growth of future leaders by mentoring upcoming executives and technology professionals. His achievements have helped lay the groundwork for a more innovative, resilient, and inclusive future.

  • speaker photo
    Brandi Johnson
    Deputy CISO, Toyota Financial Savings Bank

    Dynamic, strategic, results-driven Cybersecurity executive with deep proven experience in ensuring the security of business systems. Uses thoughtful analysis to reduce enterprise risk, cyber risk, and operational risk by deploying focused proven solutions. Leader in Cybersecurity, emerging technologies, data platforms and Governance Risk and Compliance operations. Experienced in implementing security tools, cloud technology, data and building regulatory governance programs like GDPR and CCPA. Currently pursuing CISM certification.

  • speaker photo
    Shawn E. Tuma, Moderator
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Anmol Agarwal
    Sr. Security Researcher, Nokia

    Anmol Agarwal is a security researcher at a Fortune 500 Company and is focused on securing AI and Machine Learning in 5G and 6G. She holds a doctoral degree in cybersecurity analytics from George Washington University and a master’s degree in computer science from the University of Texas at Dallas. She previously worked at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in the High Value Asset Program Management Office. In her free time, she enjoys giving back to the community and is an active industry mentor.

  • speaker photo
    Kathryn Patterson
    Sr. Lead Information Security Business Manager, TIAA

    Kathryn Patterson supports the Global Cybersecurity & Fraud Management organization at TIAA. In prior roles, she managed 3rd Pty Assessment, Regulatory Exam Mgmt and Audit support, and RCSA. Her career spans three industries: healthcare, telecommunications, and financial services, with additional background in program management, business resiliency and internal investigations. She prioritizes collaboration with business partners on best practices, communications, training, and development. Kathryn holds a BA in Organizational Leadership from the University of Oklahoma with a concentration in Criminal Investigations and Intelligence Analysis.

  • speaker photo
    Brittany George
    Partner, IT Advisory, Weaver

    Brittany George, CISA, CISM, PCIP, QSA, has over two decades of experience, including former Big Four experience with a focus on public company audits. Her current focus includes cybersecurity, system and organization controls (SOC) reporting, evaluation and testing of IT general controls (ITGCs) and regulatory compliance (including Payment Card Industry and Sarbanes-Oxley). She is also deeply experienced with system integration and user acceptance testing. Having spent the beginning of her career with TXU/Capgemini Energy, she has a deep understanding of utilities and the energy industry. She also has extensive government experience, having led IT audit activities for numerous municipalities and school districts. Additional industry experience includes technology service providers, financial services, oil and gas, health care and banking.

    Brittany is a member of the IIA, AFCOM and Tech Titans, for which she serves on the Cybersecurity Forum. She is also a member and past president of the North Texas chapter of ISACA. Highly respected in her field, she has been a guest lecturer at the University of Texas at Austin and University of Oklahoma and often presents on security and other IT advisory topics, including having presented at the PCI North America Community Meetings, Infosec World, various ISACA chapter meetings, the IIA, Allinial Global, SecureWorld and TXCPA meetings.

    A Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Payment Card Industry Professional (PCIP) and a PCI Qualified Security Assessor (QSA), she earned a Bachelor of Business Administration in management information systems from the University of Oklahoma and a professional graduate certificate in cybersecurity from Harvard.

  • speaker photo
    Trip Hillman
    Partner, Cybersecurity Services, Weaver
  • speaker photo
    Ian Schneller
    CISO, Health Care Service Corporation

    A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this role he led high impact global teams and advised the US Congress and Executive Branch, resulting in a coordinated, funded national approach to resolve the highest cyber concerns of Government leadership. In the financial sector, Ian has led strategic capabilities to protect critical infrastructure from cyber-attack.

  • speaker photo
    Jeremy Rucker
    Data Privacy & Cyber Partner, Spencer Fane LLP

    Jeremy Rucker leads businesses through the evolving and complex landscape of data privacy, security, and incident response. As a data privacy and cybersecurity attorney, Jeremy regularly counsels clients in all industries on the emerging federal, state, and international data laws and regulations, and also serves as a breach coach to guide organizations through national data breach notification processes and resultant regulator investigations.

    Jeremy is a frequent speaker on data privacy and cybersecurity matters and is certified by the International Association of Privacy Professionals as a Privacy Law Specialist. Additionally, Jeremy holds double certifications as a Certified Information Privacy Professional for United States law (CIPP/US) and European law (CIPP/E); and a certification as a Certified Information Privacy Manager (CIPM – IAPP).

  • speaker photo
    Ahmer Mirza
    Solutions Architect, Aqua Security

    Ahmer Mirza is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past three years. With a robust background in computer engineering technology, his role at Aqua Security involves implementing cutting-edge security solutions and leveraging his expertise to address complex challenges in the ever-evolving field of cloud native security. Ahmer’s blend of technical acumen and innovative problem-solving makes him an asset to his team and a trusted advisor to clients seeking to safeguard their cloud environments.

  • speaker photo
    Ed Reynolds
    Digital Security Consultant, Americas DPS, Entrust

    Ed has over 20 years’ experience in cybersecurity, covering SSL/VPN, Intel chip security technologies, endpoint protection, DLP, data at rest/in motion encryption technologies, key management, and managed security services. Based in Austin, Texas, Ed is a member of the Entrust Digital Security Solutions Center of Excellence for Data Protection Solutions. Prior to Entrust, Ed served in strategic alliance roles at Thales DIS and Symantec, where he worked with Global System Integrators. Earlier, he held leadership roles software products at Dell, semiconductors at Britestream Networks, and networking products at Compaq and Motorola.

  • speaker photo
    Benjamin Wood
    MySQL Master Solutions Engineer, Oracle
  • speaker photo
    William Floyd, Moderator
    Former CIO/CISO, FUTU US Inc.

    I am an innovative technology executive with extensive leadership experience within a diverse portfolio of technology-driven public and private companies. I am results driven with considerable experience leading teams, implementing complex software products, IT projects, and administering large capital budgets.

    I am a dynamic leader and designer of innovative and high-performing teams that contribute strategically across organization initiatives. I am a strong communicator with focus on team success through a professional and meticulous approach to leading initiatives with uncompromising leadership, organizational development, and business operations skills.

    I have a successful track record of commercial/SaaS product and technology delivery that produces business growth, garnering awards and industry-wide recognition. I am a flexible team leader willing to take risks, adopt new methods, and seek opportunities for improvement of systems and processes.

    I have been a leader of a variety of software product management and product development teams of all sizes, through all phases of Internet, mobile and software product management, product development, quality assurance, program and release management and DevOps deployment. I have also included the leadership of Information Technology infrastructure and operations teams responsible for enterprise IT System operations, development, and enterprise deployment.

  • speaker photo
    Teresa Merklin
    Cyber Fellow, Aeronautics Cyber Range, Lockheed Martin

    Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.

  • speaker photo
    Chris Scheels, Moderator
    Vice President, Gurucul

    Chris has been aligning people, processes and technology to drive companies forward for over 20 years. He has a decade of cybersecurity experience in product marketing and product management. His passion is helping businesses succeed through the strategic use of technology. Most recently he was helping customers accelerate their Zero Trust journey at Appgate, Inc. His background also includes experience in operations, sales, and new business development.

  • speaker photo
    Al Lindseth
    Principal, CI5O Advisory Services LLC

    Highly effective and successful senior executive with 25 years in the energy industry. Experience and knowledge spans different markets, products, business models and disciplines. Proven track record of:
    Driving resolution of the top challenges facing different groups, companies or individuals, whether as a member of its management team or as an outside expert;
    Acting as change agent to effect turnaround situations and solve critical problems;
    Balancing between an entrepreneurial culture and the discipline to achieve the high standards and controls of a large public company; and
    Doing more with less (PAALP ranked #5 in Forbes 500 in revenues/employee in 2009)

  • speaker photo
    Parrish Gunnels
    SVP & CISO, Sunflower Bank, N.A.

    Parrish is currently SVP & CISO of Sunflower Bank and has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information security. His experience also includes working in multiple industries including financial services, telecommunications, chemical manufacturing, real estate, and retail. In addition, he has worked in both global Fortune 500 companies and small start-up-based companies.

    During his tenure as a CISO, he has been involved in the creation, staffing, building, and management of comprehensive information security programs for various companies across diverse locations and personnel. In all these companies, he has implemented programs based on risk and threat analysis and has implemented controls, services, and processes that have not only met the needs of the company but also the regulatory and compliance requirements of the company including incident response capabilities.

    Parrish holds a Master of Business Administration from Texas Christian University and certifications as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), and Professional Project Manager (PMP).

  • speaker photo
    Brock Bauer
    Security Architect, Varonis

    Brock Bauer is a Security Architect from the Incident Response Team at Varonis. He helps customers achieve their security goals through the Varonis platform by enabling them to detect and respond to threats, reduce their attack surface, and mature their security programs. Brock has worn various hats during his career in Enterprise IT Administration, Software Security Architecture, and Incident Response.

  • speaker photo
    Todd Knapp
    CEO, Envision Technology Advisors

    Todd has been providing IT services nationally for over 25 years and draws inspiration and insight from participation in a wide range of executive boards and industry associations. He has an extensive background in strategic planning and implementation of business technology solutions, and founded his firm Envision Technology Advisors. As a presenter, Todd speaks throughout the country on a variety of technology and business topics including: Modern Workplace, Digital Transformation, Cybersecurity, and Evolving Digital Culture to fit the Modern Workforce.

    In his free time, Todd works with several non-profits and is also an avid sailor, wood worker, and scuba diver.

  • speaker photo
    Dillon White, Moderator
    Director, KMicro Tech

    Meet Dillon White, a Solutions Engineering whiz and the driving force behind sales engineering at KMicro Tech. With a knack for hybrid cloud solutions and services, Dillon combines his extensive industry experience with a dash of innovation to spark business growth. Before diving into the tech world, Dillon served eight impactful years in the United States Coast Guard, adding a unique perspective to his expertise.
    From cybersecurity to Microsoft Dynamics 365, Azure, and Modern Work, Dillon has seen it all. He's your go-to guide for digital transformation, helping businesses—big and small, retail and federal—navigate the tech maze and come out on top. His strategic insights and customer-first approach have consistently empowered organizations to hit new heights.

  • speaker photo
    Brittany George, Moderator
    Partner, IT Advisory, Weaver

    Brittany George, CISA, CISM, PCIP, QSA, has over two decades of experience, including former Big Four experience with a focus on public company audits. Her current focus includes cybersecurity, system and organization controls (SOC) reporting, evaluation and testing of IT general controls (ITGCs) and regulatory compliance (including Payment Card Industry and Sarbanes-Oxley). She is also deeply experienced with system integration and user acceptance testing. Having spent the beginning of her career with TXU/Capgemini Energy, she has a deep understanding of utilities and the energy industry. She also has extensive government experience, having led IT audit activities for numerous municipalities and school districts. Additional industry experience includes technology service providers, financial services, oil and gas, health care and banking.

    Brittany is a member of the IIA, AFCOM and Tech Titans, for which she serves on the Cybersecurity Forum. She is also a member and past president of the North Texas chapter of ISACA. Highly respected in her field, she has been a guest lecturer at the University of Texas at Austin and University of Oklahoma and often presents on security and other IT advisory topics, including having presented at the PCI North America Community Meetings, Infosec World, various ISACA chapter meetings, the IIA, Allinial Global, SecureWorld and TXCPA meetings.

    A Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Payment Card Industry Professional (PCIP) and a PCI Qualified Security Assessor (QSA), she earned a Bachelor of Business Administration in management information systems from the University of Oklahoma and a professional graduate certificate in cybersecurity from Harvard.

  • speaker photo
    Shelly Thomas
    SVP, South Central Zone Regional Manager, Cyber Practice, Marsh

    Shelly is the Southcentral Zone Regional Manager within Marsh’s Cyber Practice in Dallas, TX. Responsibilities include advising a number of Marsh’s clients across various industries on risk transfer solutions and helping clients tactically navigate the evolving cyber and technology landscape. Shelly strives to cultivate strong relationships with clients and markets.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Jonathan Ciaramella
    Sr. Threat Intel Analyst, Fortune 500 Convenience Retail

    Accomplished Senior Threat Intelligence Analyst and expert threat hunter with a robust background in cybersecurity, holding certifications in Penetration Testing and Bug Bounty. Proficient in Incident Response, Threat Hunting, Intelligence, Computer Forensics, Red Teaming, Penetration Testing, Vulnerability Assessment, and Audits. Skilled in designing SOCs, managing SIEM systems, conducting Risk Analysis, and developing Global Security Policies. Demonstrates expertise in Malware Analysis and Remediation, adept at enhancing security across complex IT environments to mitigate risks and protect organizational assets.

  • speaker photo
    Gabriel Nwajiaku
    Commissioner, City of Austin's Community Technology and Telecommunications Commission

    Gabriel Nwajiaku is a seasoned cybersecurity expert, army veteran, and community leader. Holding a diverse array of certifications including CISM, PMP, Security+, and CySA+, Gabriel brings a wealth of knowledge and experience to the table. His journey began in the military, where he honed his skills in strategic planning and risk management, serving his country with distinction.

    After transitioning from the military, Gabriel continued his pursuit of excellence in cybersecurity, earning multiple certifications to further solidify his expertise. His commitment to continuous learning and professional development has enabled him to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats and challenges.

    In addition to his impressive professional achievements, Gabriel is also deeply engaged in his community. As the Commissioner of the City of Austin's Community Technology and Telecommunications Commission, he plays a vital role in shaping policies and initiatives that promote digital inclusion and access to technology for all residents.

    With a passion for empowering individuals and organizations to navigate the complexities of cybersecurity, Gabriel brings a unique perspective to the table. His insights into establishing purpose and direction in this nebulous terrain are sure to inspire and enlighten audiences at the conference.

  • speaker photo
    Happy Hour
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes