Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 1, 20259:00 am[PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmAI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.
Lesson 1: What is Artificial Intelligence?
Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.Lesson 2: What are the AI threats?
Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.Lesson 3: What are the AI vulnerabilities?
Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.Lesson 4: What are AI security controls?
Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.Lesson 5: What is AI risk management?
Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data CardsLesson 7: What are the AI governance, AI compliance, AI audit requirements?
Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.Lesson 8: Building an AI security program
Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursvCISO, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, October 2, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Securing the Big D and Beyond: Lessons in Leadership from Top CISOsCISO, MVB Financial Corp.CISO, City of PlanoCISO & VP, Information Security, Texas Mutual Insurance CompanySVP & CISO, InforRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Dallas and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 21st edition of SecureWorld Dallas.9:45 amNetworking Break & Cyber ConnectCome learn about BlackGirlsHack – Join this bonus session in the Networking HallRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallCome meet the local leadership for BlackGirlsHack, learn about what they do and how to join (anyone and everyone are welcome), and ask any questions you may have.10:15 amFrom Chaos to Control: Automating Cloud Security with AI InsightsCloud Security Engineering Team Lead, HumanaRegistration Level:Conference Pass
10:15 am - 10:50 pmThis presentation highlights the importance of using certified components, enforcing security controls with automated validation, and leveraging AI-driven insights for smarter and more efficient exception management. In modern cloud environments, trusted components and continuous validation accelerate secure application delivery and reduce misconfiguration risks. Automated security architecture validation ensures controls are consistently applied, enabling teams to detect drift early and respond with confidence. With AI-driven insights and exception management oversight, organizations can prioritize risks and streamline approvals. These combined practices empower businesses to move applications to the cloud faster, improve developer productivity, and maintain strong, scalable cloud security postures.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsChief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin CollegeInformation Security Advisory; Former CISO at HCSCSr. Director – GRC | Global Information Security, HiltonRegistration Level:Conference Pass
10:15 am - 10:50 amThis panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.10:15 amRethinking Security for the Modern Enterprise: A Strategic Lens for Enterprise Security ProfessionalsSr. Solutions Architect, Cybersecurity, C1Registration Level:Open Sessions
10:15 am - 10:50 amAs digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.
We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.
Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.
Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.
10:50 amNetworking Break & Cyber ConnectCome learn about the WiCyS DFW affiliate – Join this bonus session in the Networking HallRegistration Level:Open Sessions
10:50 am - 11:10 amLocation / Room: Exhibitor HallCome by the networking lounge on the Exhibitor Hall floor to meet the local WiCyS DFW affiliate board, learn about what they do and how to join (men are welcome, too), and ask any questions you may have.
11:10 amLocking the Future: Why Data Security Is the Key to Trustworthy AIData Strategy and Data Information Architect, Bank of AmericaRegistration Level:Conference Pass
11:10 am - 11:45 amAs AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.
11:10 amEverything You Need to Know About Cyber Resiliency Can Be Learned from American FootballCyber Fellow, Aeronautics Cyber Range, Lockheed MartinRegistration Level:Conference Pass
11:10 am - 11:45 amIncrease your knowledge of cyber resiliency by examining it through the lens of American football. This presentation delves into the surprising parallels between the sport and cybersecurity, discussing themes such as teamwork, strategic planning, and continuous improvement. Discover how football’s principles can inform and enhance your organization’s cybersecurity posture, and learn how to “win the game” against cyber threats.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceSr. Inside Solution Engineer, TaniumRegistration Level:Open Sessions
11:10 am - 11:45 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Bridging the Gap: The Role of the BISO in Modern CybersecurityHead of Global Business Information Security Office, CBRESr. Principal, Information Security, BISO, Mr. CooperSr. Cybersecurity BISO Analyst, CBREBISO, Toyota Financial Services CorporationBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Registration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectCome learn about the local Cyversity affiliate – Join this bonus session in the Networking HallPresident, Cyversity North Texas ChapterRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallCome by the Networking Hall right after lunch to meet the local Cyversity affiliate leadership and learn about their mission to achieve the consistent representation of women, underrepresented communities, and all veterans in the cybersecurity industry through programs designed to diversify, educate, and empower.
1:15 pmBridging the Privacy Divide: How Texas Is Catching up to CaliforniaPartner & Attorney, Pierson Ferdinand LLPRegistration Level:Conference Pass
1:15 pm - 1:50 pmWith Texas leading a wave of new data privacy and cybersecurity legislation in recent years, organizations face rapidly evolving requirements. This session addresses the most significant changes to Texas law, including enactment of the Texas Data Privacy and Security Act and new cybersecurity safe harbor provisions. Attendees will also learn how other states are approaching privacy and security regulation.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:Conference Pass
1:15 pm - 1:50 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityChief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin CollegeRegistration Level:Open Sessions
1:15 pm - 1:50 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
1:50 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:Open Sessions
1:50 pm - 2:10 pmLocation / Room: Exhibitor HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pm[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsRegistration Level:Conference Pass
2:10 pm - 2:45 pmThis panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
2:10 pmAI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security LeadersSr. Security Engineer, Exeter Finance LLCLead IT Security Engineer, Tyson FoodsRegistration Level:Conference Pass
2:10 pm - 2:45 pmAs quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?2:10 pm[Panel] Proactive Security: Building Digital Fortresses Against Modern DragonsVP of Strategy, SixMapRegistration Level:Open Sessions
2:10 pm - 2:45 pmIn the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.
This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.
Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:Open Sessions
2:45 pm - 3:00 pmLocation / Room: Exhibitor HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityRegistration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.Expect candid insights on topics such as:-
The toughest decisions CISOs face daily
-
Emerging threats and how security leaders are preparing
-
The future of security operations, compliance, and resilience
-
Strategies for bridging the gap between security teams and executive leadership
-
Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.3:45 pmHappy Hour & Dash for PrizesRegistration Level:Open Sessions
3:45 pm - 4:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- Blink Ops, IncBooth: 260
Automate all things security in the Blink of AI.
BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.
Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.
Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.
- C1 | CiscoBooth: 200
C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- Cyversity North TexasBooth: TBD
Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.
- HackNoticeBooth: 250
HackNotice not only unifies your threat intel needs in one place, but optimizes and maximizes your threat defenses in ways that no other platform can.
Whether that’s searching for any term you need, tracking the full range of compromised PII, getting real-time alerts for every hack and leak, or any of our other advantages, HackNotice is the industry standard for threat intel.
- HUMAN SecurityBooth: 210
HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.
- InfraGard North Texas Members AllianceBooth: TBD
The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:
- Local quarterly membership meetings focused on infrastructure protection
- Sector-specific meetings and information exchanges (see Sector Chief Program).
- Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
- Networking opportunities with peers within and across all sectors
- ISC2 Dallas-Fort Worth ChapterBooth: TBD
The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.
- Association of Continuity Professionals (ACP) North TexasBooth: TBD
ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.
Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week. We invite you to attend our next meeting.
- KeysightBooth: 110
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- Legato SecurityBooth: 130
Our mission is to provide comprehensive, customer-centric managed cyber security services that effectively manage and mitigate cyber risks on behalf of our customers. We continually adapt and innovate our services to stay ahead of emerging threats and evolving technologies, delivering peace of mind and enabling our customers to focus on their core business objectives. With a team of dedicated experts and cutting-edge technologies, we strive to build trusted partnerships, deliver exceptional value, and safeguard our customers’ digital assets with unwavering commitment.
- North Texas ISSABooth: TBD
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.
- Seceon Inc.Booth: 330
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools. What Sets Seceon Apart: * Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution. * AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation. * Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard. * Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360. Why Organizations Choose Seceon: * Cut cybersecurity costs by 60% by replacing siloed tools * Stop threats faster with AI-powered detection and automated response. * Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence. Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- SecPod Technologies, Inc.Booth: 140
SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
• Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
• Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.
- SixMapBooth: 220
SixMap provides the most accurate and complete external view of your organization—no input required, just the company name. Our preemptive exposure management platform inspects all 65,535 ports as standard operating procedure—across IPv4 and IPv6— continuously hunting unknown assets, misconfigurations, and blindspots other tools miss. Built for security teams tired of tools that assume too much and miss even more, SixMap replaces guesswork with precision. So you can act faster, reduce exposure, and see what attackers see.
- Sumo LogicBooth: 310
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- TaniumBooth: 340
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
- ThreatLockerBooth: 320
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- U.S. Secret Service – Cyber Fraud Task ForceBooth: TBD
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- WiCyS Dallas Forth Worth AffiliateBooth: TBD
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Parrish GunnelsCISO, MVB Financial Corp.
Parrish is currently the CISO at MVB Financial Corp. and is the former SVP & CISO of Sunflower Bank. He has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information security. His experience also includes working in multiple industries including financial services, telecommunications, chemical manufacturing, real estate, and retail. In addition, he has worked in both global Fortune 500 companies and small start-up-based companies.
During his tenure as a CISO, he has been involved in the creation, staffing, building, and management of comprehensive information security programs for various companies across diverse locations and personnel. In all these companies, he has implemented programs based on risk and threat analysis and has implemented controls, services, and processes that have not only met the needs of the company but also the regulatory and compliance requirements of the company including incident response capabilities.
Parrish holds a Master of Business Administration from Texas Christian University and certifications as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), and Professional Project Manager (PMP).
- Chandan KochharCISO, City of Plano
- John Sapp Jr.CISO & VP, Information Security, Texas Mutual Insurance Company
John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations. He is a frequent speaker at some of the largest technology and healthcare industry events.
- Mignona Coté, ModeratorSVP & CISO, Infor
- BlackGirlsHack Representative
- Santosh Datta BompallyCloud Security Engineering Team Lead, Humana
Santosh Bompally is a dedicated cybersecurity professional with a degree in Computer Science and a Master’s in Cybersecurity. He holds several certifications, including CISSP and CCSP, and currently leads cloud security engineering initiatives at Humana, focusing on security controls for multi-cloud environments. Before joining Humana, Santosh gained valuable experience in various industries and made significant contributions to a cybersecurity startup specializing in comprehensive services. He is actively involved in the cybersecurity community, participating in ISACA and (ISC)² circles, speaking at industry meetups, and contributing to publications from the Cloud Security Alliance, sharing his insights to foster collaboration in cybersecurity.
- Dr. Kimberly KJ HaywoodChief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin College
Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.
- Ian SchnellerInformation Security Advisory; Former CISO at HCSC
A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this role he led high impact global teams and advised the US Congress and Executive Branch, resulting in a coordinated, funded national approach to resolve the highest cyber concerns of Government leadership. In the financial sector, Ian has led strategic capabilities to protect critical infrastructure from cyber-attack.
- Chad ThiemannSr. Director – GRC | Global Information Security, Hilton
Chad Thiemann has 14 years of active duty and national guard service as an Army Logistics Officer and is a combat veteran. He has been in Corporate America for over 26 years where he has served in various roles
spanning cybersecurity, privacy, and risk management. Chad currently serves as the Sr. Director of GRC – Global Information Security at Hilton.Prior to Hilton, Chad had an eighteen-year tenure at CVS Health with varying roles: IT Audit Sr. Manager, Director - Information Governance & Privacy Operations, Lead Director -
Cyber Defense, and as a BISO. Chad also has held cybersecurity related roles at Arthur Andersen and Merck Pharmaceuticals before arriving at CVS Health. For the past seven years, Chad has served as an Adjunct Professor of Cybersecurity for the Carter Graduate College of Business at Dallas Baptist University. Chad has undergraduate degrees in MIS and Operations Management & Logistics from Boston University.
Additionally, Chad has a graduate certificate in ‘Cybersecurity: Technology, Application & Policy’ from MIT and an Executive Masters in Cybersecurity from Brown University.Through the military, Chad completed various graduate level programs in leadership, strategy, and logistics from the Army Logistics Management
College; Command & General Staff College; and the Naval Postgraduate School. Chad enjoys reading, travel, wine, soccer, and ice hockey. Chad and his wife currently reside in Plano, TX. - Caheen MurphySr. Solutions Architect, Cybersecurity, C1
Caheen Murphy is a highly experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.
- Women in CyberSecurity (WiCyS) DFW Affiliate, Host
- Jennifer FiteData Strategy and Data Information Architect, Bank of America
Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.
- Teresa MerklinCyber Fellow, Aeronautics Cyber Range, Lockheed Martin
Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.
- Doug MitchellSr. Inside Solution Engineer, Tanium
Doug Mitchell is an Air Force veteran with a background in security operations & engineering. Leveraging expertise in vulnerability management, incident response, and threat detection, he now serves as a solution engineer at Tanium helping reduce enterprise risk. Doug holds a Masters in Cybersecurity and various certifications, including CISSP, CCSP, and GCIH.
- Panel Discussion
- Janie AggasHead of Global Business Information Security Office, CBRE
Janie Aggas is the Head of Global Business Information Security Office (BISO) at CBRE. She is a visionary information security leader and change agent with an impeccable record spanning 20+ years, contributing to technology transformations and cybersecurity strategies to solve complex business challenges while reducing risk for Fortune 500 companies. She is recognized as a passionate leader and trusted advisor for the C-suite, business, technology teams, and with partners such as compliance, legal, privacy, risk, and internal audit. She is no stranger to protecting valuable assets having begun her technology career in the defense industry and spending 10+ years in the financial services industry prior to her transition to CBRE. She earned a BBA in Computer Information Systems and an MBA from West Texas A&M University and recently completed an MLS in Cybersecurity Law & Policy from Texas A&M School of Law.
- Shannon AlbrightSr. Principal, Information Security, BISO, Mr. Cooper
- Marivell Alicea-GamlinSr. Cybersecurity BISO Analyst, CBRE
Marivell Alicea-Gamlin is a Senior Cybersecurity BISO Analyst at CBRE, where she connects cybersecurity strategy to business outcomes through client assurance, audit support, and third-party risk engagement. With more than 20 years of experience across IT operations, governance, and compliance, she plays a key role in shaping cyber strategy and building client trust. Marivell serves on the board of ISSA Puget Sound as Director of Membership and actively mentors emerging cybersecurity professionals. She holds a Master’s in Network and Communications Management, is ISC2 Certified in Cybersecurity (CC), and brings a global perspective with fluency in Spanish and developing proficiency in Portuguese.
- Lovelie MooreBISO, Toyota Financial Services Corporation
- Elvis Moreland, ModeratorBISO/CISO, ILIAS Federal Solutions (IFED), Inc.
Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.
Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.
- Renaldo McKenzie, HostPresident, Cyversity North Texas Chapter
Renaldo McKenzie is a seasoned professional & cybersecurity leader with a diverse background of proven success in various industries and critical sectors such as Information Technology, Healthcare, Communications, Financial, Transportation, and Government.
His knowledge and expertise are in program development, management, and advancement of Governance, Risk, and Compliance, Identity & Access Management, Security Operations, and Security Awareness Education & Training where he has successfully developed, managed, and transformed several organizational security programs through collaborative stakeholder engagement to drive change, align with business objectives, and scalability.
Renaldo conducted his studies at Navarro College and The University of Texas at Arlington and has continued his professional development & education through various courses, certifications, and hands on engagements. In addition to his professional experience, Renaldo is known for often giving back to the community by serving as an advisor, mentor, and ambassador for several individuals and organizations.
- Jeremy RuckerPartner & Attorney, Pierson Ferdinand LLP
Jeremy Rucker is a partner in the law firm Pierson Ferdinand LLP and leads businesses through the evolving and complex landscape of data privacy, security, and incident response. Jeremy regularly counsels clients in all industries on the emerging federal, state, and international data laws and regulations and also serves as a breach coach to guide organizations of all backgrounds through national data breach notification processes and resultant regulator investigations.
Jeremy is certified by the International Association of Privacy Professionals as a Privacy Law Specialist, and holds certifications as a Certified Information Privacy Professional for United States law (CIPP/US) and European law (CIPP/E).
- Panel Discussion
- Dr. Kimberly KJ Haywood, ModeratorChief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin College
Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.
- Panel Discussion
- Ankit GuptaSr. Security Engineer, Exeter Finance LLC
Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.
- Shilpi MittalLead IT Security Engineer, Tyson Foods
Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.
Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.
Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.
- Larry SlusserVP of Strategy, SixMap
Larry Slusser is the Vice President of Strategy for SixMap. A former Air Force Officer, Larry has built his career responding to and preventing sophisticated cyber attacks through continuous cyber risk assessment, vulnerability monitoring, and mitigation strategies. Most recently at SecurityScorecard, he led their Global Cyber Risk Solutions Team innovating Scorecard’s MAX offering, a Supply Chain Detection and Response tool. Larry has developed market leading strategic and tactical roadmaps aligning technical service offerings with customer needs across digital forensics, incident response, and ransomware mitigation. His leadership spans people, process, and practice excellence, developing operational infrastructure and highly skilled global teams that drive cybersecurity innovation.
- Panel Discussion
- Fred ClaytonCISO, Akumin
As a seasoned Chief Information Security Officer, Fred specializes in driving cybersecurity strategies that protect enterprise ecosystems while enabling business growth. With expertise in financial tech, healthcare, and government verticals, he has built and led robust security frameworks tailored to the unique challenges of these industries.
His approach combines strategic vision with technical insight, encompassing risk management, threat intelligence, incident response, and regulatory compliance. He excels at collaborating with stakeholders at all levels, translating complex security challenges into actionable solutions that align with organizational objectives.
Whether navigating stringent regulatory landscapes or safeguarding sensitive data, Fred thrives in dynamic environments where innovation, resilience, and leadership converge to ensure secure, sustainable success.
- Elaine FleschCISO, Taxwell
Elaine Flesch is an accomplished cybersecurity and technology executive with experience in leading global cyber and risk programs. She is the Chief Information Security Officer at Taxwell (a leading digital tax filing platform). She also serves as an Executive Board Member to TXCPA and an Advisory Board Member to the University of Texas at Dallas MS Accounting program. Elaine has an MBA from The University of Texas at Dallas. She also has a Master and a Bachelor of Science in Computer Science from UFMG (Brazil). She is a licensed Certified Public Accountant (CPA) in the state of Texas. She actively holds multiple professional and cybersecurity certifications, including the National Association of Corporate Directors’ Directorship Certified (NACD.DC), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM).
- Bryce Carter, ModeratorCISO, City of Arlington
Bryce Carter is the Chief Information Security Officer for the City of Arlington, Texas, a major city known for its world-class entertainment district, where he leads an enterprise security office overseeing all critical infrastructure and essential services. He holds approximately 20 years of executive leadership experience across government, aviation, healthcare, utilities, and technology services. Recognized as a 2025 ORBIE Award Winner and named a Top 100 CISO Globally in 2025, he also serves on numerous advisory boards, mentors new and emerging leaders, and commits much of his time to the outdoors.
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
