googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 1, 2025
    9:00 am
    [PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and Applications
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    AI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.

    Lesson 1: What is Artificial Intelligence?
    Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.

    Lesson 2: What are the AI threats?
    Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.

    Lesson 3: What are the AI vulnerabilities?
    Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.

    Lesson 4: What are AI security controls?
    Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.

    Lesson 5: What is AI risk management?
    Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.

    Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
    One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data Cards

    Lesson 7: What are the AI governance, AI compliance, AI audit requirements?
    Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    Lesson 8: Building an AI security program
    Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.

    Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Thursday, October 2, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Securing the Big D and Beyond: Lessons in Leadership from Top CISOs
    • session level icon
    speaker photo
    CISO, MVB Financial Corp.
    speaker photo
    CISO & VP, Information Security, Texas Mutual Insurance Company
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    The role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Dallas and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.
    This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 21st edition of SecureWorld Dallas.
    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:15 am
    From Chaos to Control: Automating Cloud Security with AI Insights
    • session level icon
    speaker photo
    Cloud Security Engineering Team Lead, Humana
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 pm

    This presentation highlights the importance of using certified components, enforcing security controls with automated validation, and leveraging AI-driven insights for smarter and more efficient exception management. In modern cloud environments, trusted components and continuous validation accelerate secure application delivery and reduce misconfiguration risks. Automated security architecture validation ensures controls are consistently applied, enabling teams to detect drift early and respond with confidence. With AI-driven insights and exception management oversight, organizations can prioritize risks and streamline approvals. These combined practices empower businesses to move applications to the cloud faster, improve developer productivity, and maintain strong, scalable cloud security postures.

    10:15 am
    The Intersection of GRC and Information Security: Safeguarding Systems, Data, and Compliance
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Governance, Risk, and Compliance (GRC) is more than just a regulatory checkbox; it’s a critical framework for protecting information systems and data while ensuring third-party compliance. When effectively implemented, GRC empowers organizations to mitigate risks and align security strategies with business objectives. However, poorly executed GRC processes can lead to compliance failures, operational disruptions, and significant financial consequences. This session dives into:

    • Core Principles of GRC in Information Security: Understand how GRC frameworks support the protection of information systems and sensitive data while addressing third-party compliance requirements.
    • Practical Implementation Strategies: Explore actionable approaches to integrate GRC processes into your information security program without creating unnecessary complexity or friction.
    • The Financial Risks of Poor GRC: Learn how inadequate GRC practices can lead to regulatory fines, reputational damage, and wasted resources—and how strong GRC can protect your bottom line.
    • Balancing Compliance and Security: Discover how to meet compliance obligations without compromising the agility and effectiveness of your security posture.

    Whether you’re establishing a GRC program or seeking to optimize an existing framework, this session provides the insights and tools to align your governance, risk, and compliance efforts with your InfoSec priorities while safeguarding your organization’s financial health.

    10:15 am
    Tabletop Exercises: The Fun Kind
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Tabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!

    This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Exhibitor Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    Locking the Future: Why Data Security Is the Key to Trustworthy AI
    • session level icon
    speaker photo
    Data Strategy and Data Information Architect, Bank of America
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

    11:10 am
    Everything You Need to Know About Cyber Resiliency Can Be Learned from American Football
    • session level icon
    speaker photo
    Cyber Fellow, Aeronautics Cyber Range, Lockheed Martin
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Increase your knowledge of cyber resiliency by examining it through the lens of American football. This presentation delves into the surprising parallels between the sport and cybersecurity, discussing themes such as teamwork, strategic planning, and continuous improvement. Discover how football’s principles can inform and enhance your organization’s cybersecurity posture, and learn how to “win the game” against cyber threats.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Bridging the Gap: The Role of the BISO in Modern Cybersecurity
    • session level icon
    speaker photo
    Head of Global Business Information Security Office, CBRE
    speaker photo
    Sr. Cybersecurity BISO Analyst, CBRE
    speaker photo
    BISO, Toyota Financial Services Corporation
    speaker photo
    BISO/CISO, ILIAS Federal Solutions (IFED), Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    As cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.
    In this engaging panel discussion, regional BISOs  share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.
    Attendees will gain:
    Join us to explore the intersection of business and security and how mastering both can accelerate your career.
    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    Cybersecurity Challenges for Small and Medium Businesses
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Small and medium businesses (SMBs) are the backbone of the U.S. economy, generating over half of the annual GDP and employing millions of Americans. But they also face unique cybersecurity challenges that can threaten their survival and growth. In this talk, learn how to assess and mitigate the cyber risks that SMBs face, and how to implement a robust cybersecurity program with limited resources and expertise.

    We cover the following topics:

    • The state of SMB cybersecurity in the U.S.
    • The cost and impact of cyber breaches on SMBs
    • The main cyber threats and vulnerabilities that SMBs face
    • The best practices and frameworks for SMB cybersecurity
    • The steps to build or improve your cybersecurity program

    Whether you are an IT manager, a cybersecurity professional, or a business owner, this talk is informative and practical. Walk away with a better understanding of the cyber landscape and the tools and techniques to protect your SMB from cyberattacks.

    1:15 pm
    Addressing the Cybersecurity Skill Shortage Internally and Externally
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    This presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Chief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    2:10 pm
    AI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security Leaders
    • session level icon
    speaker photo
    Sr. Security Engineer, Exeter Finance LLC
    speaker photo
    Lead IT Security Engineer, Tyson Foods
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    As quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.
    In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.
    Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?
    2:10 pm
    [Panel] Proactive Security: Building Digital Fortresses Against Modern Dragons
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.

    This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.

    Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Exhibitor Hall

    This is your final chance to visit the Exhibitor Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater
    Ever wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.
    Expect candid insights on topics such as:
    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners
    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.
    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

    4:00 pm
    Cyber Pitch Battle Royale & Happy Hour
    • session level icon
    Open to all attendees; separate registration required
    speaker photo
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
    speaker photo
    Co-Host, Bare Knuckles & Brass Tacks Podcast
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 6:00 pm

    Come join your fellow attendees for an exciting conclusion to the conference with a complimentary Happy Hour prior to a one-of-a-kind event.

    The Cyber Pitch Battle Royale reimagines how cybersecurity vendors and senior leaders connect. Brought to life by the hosts of the award-winning cybersecurity podcast, Bare Knuckles and Brass Tacks, this event combines their raw energy with the fun of a comedy roast. The result is an electric atmosphere where vendors brave the stage for five minutes before a crowd that’s encouraged to cheer innovation and jeer jargon. With a panel of five CISO judges and an audience of decision-makers from Canada’s leading organizations, contestants will compete for the Battle of Toronto Champion Belt in a format that strips away traditional corporate pretense. This breakthrough event promises to transform industry networking through authenticity, humor, and high-energy engagement. As one CISO put it, “I didn’t know what to expect, but it blew my expectations. I’d wanna do this again and again!”

     

Exhibitors
  • BlackGirlsHack
    Booth: TBD

    We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.

    The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.

    BlackGirlsHack is open to all!

  • C1
    Booth: TBD

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Cyversity North Texas
    Booth: TBD

    Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.

  • HUMAN Security
    Booth: TBD

    HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.

  • InfraGard North Texas Members Alliance
    Booth: TBD

    The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:

    • Local quarterly membership meetings focused on infrastructure protection
    • Sector-specific meetings and information exchanges (see Sector Chief Program).
    • Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
    • Networking opportunities with peers within and across all sectors
  • ISC2 Dallas-Fort Worth Chapter
    Booth: TBD

    The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

  • Association of Continuity Professionals (ACP) North Texas
    Booth: TBD

    ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.

    Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week.  We invite you to attend our next meeting.

  • Keysight
    Booth: TBD

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Legato Security
    Booth: TBD

    Our mission is to provide comprehensive, customer-centric managed cyber security services that effectively manage and mitigate cyber risks on behalf of our customers. We continually adapt and innovate our services to stay ahead of emerging threats and evolving technologies, delivering peace of mind and enabling our customers to focus on their core business objectives. With a team of dedicated experts and cutting-edge technologies, we strive to build trusted partnerships, deliver exceptional value, and safeguard our customers’ digital assets with unwavering commitment.

  • North Texas ISSA
    Booth: TBD

    The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • U.S. Secret Service – Cyber Fraud Task Force
    Booth: TBD

    Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • WiCyS Dallas Forth Worth Affiliate
    Booth: TBD
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Parrish Gunnels
    CISO, MVB Financial Corp.

    Parrish is currently the CISO at MVB Financial Corp. and is the former SVP & CISO of Sunflower Bank. He has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information security. His experience also includes working in multiple industries including financial services, telecommunications, chemical manufacturing, real estate, and retail. In addition, he has worked in both global Fortune 500 companies and small start-up-based companies.

    During his tenure as a CISO, he has been involved in the creation, staffing, building, and management of comprehensive information security programs for various companies across diverse locations and personnel. In all these companies, he has implemented programs based on risk and threat analysis and has implemented controls, services, and processes that have not only met the needs of the company but also the regulatory and compliance requirements of the company including incident response capabilities.

    Parrish holds a Master of Business Administration from Texas Christian University and certifications as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), and Professional Project Manager (PMP).

  • speaker photo
    John Sapp Jr.
    CISO & VP, Information Security, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations. He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    Panel Discussion
  • speaker photo
    Santosh Datta Bompally
    Cloud Security Engineering Team Lead, Humana

    Santosh Bompally is a dedicated cybersecurity professional with a degree in Computer Science and a Master’s in Cybersecurity. He holds several certifications, including CISSP and CCSP, and currently leads cloud security engineering initiatives at Humana, focusing on security controls for multi-cloud environments. Before joining Humana, Santosh gained valuable experience in various industries and made significant contributions to a cybersecurity startup specializing in comprehensive services. He is actively involved in the cybersecurity community, participating in ISACA and (ISC)² circles, speaking at industry meetups, and contributing to publications from the Cloud Security Alliance, sharing his insights to foster collaboration in cybersecurity.

  • speaker photo
    Jennifer Fite
    Data Strategy and Data Information Architect, Bank of America

    Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.

  • speaker photo
    Teresa Merklin
    Cyber Fellow, Aeronautics Cyber Range, Lockheed Martin

    Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.

  • speaker photo
    Panel Discussion
  • speaker photo
    Janie Aggas
    Head of Global Business Information Security Office, CBRE

    Janie Aggas is the Head of Global Business Information Security Office (BISO) at CBRE. She is a visionary information security leader and change agent with an impeccable record spanning 20+ years, contributing to technology transformations and cybersecurity strategies to solve complex business challenges while reducing risk for Fortune 500 companies. She is recognized as a passionate leader and trusted advisor for the C-suite, business, technology teams, and with partners such as compliance, legal, privacy, risk, and internal audit. She is no stranger to protecting valuable assets having begun her technology career in the defense industry and spending 10+ years in the financial services industry prior to her transition to CBRE. She earned a BBA in Computer Information Systems and an MBA from West Texas A&M University and recently completed an MLS in Cybersecurity Law & Policy from Texas A&M School of Law.

  • speaker photo
    Marivell Alicea-Gamlin
    Sr. Cybersecurity BISO Analyst, CBRE

    Marivell Alicea-Gamlin is a Senior Cybersecurity BISO Analyst at CBRE, where she connects cybersecurity strategy to business outcomes through client assurance, audit support, and third-party risk engagement. With more than 20 years of experience across IT operations, governance, and compliance, she plays a key role in shaping cyber strategy and building client trust. Marivell serves on the board of ISSA Puget Sound as Director of Membership and actively mentors emerging cybersecurity professionals. She holds a Master’s in Network and Communications Management, is ISC2 Certified in Cybersecurity (CC), and brings a global perspective with fluency in Spanish and developing proficiency in Portuguese.

  • speaker photo
    Lovelie Moore
    BISO, Toyota Financial Services Corporation
  • speaker photo
    Elvis Moreland, Moderator
    BISO/CISO, ILIAS Federal Solutions (IFED), Inc.

    Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.

    Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.

  • speaker photo
    Panel Discussion
  • speaker photo
    Dr. Kimberly KJ Haywood, Moderator
    Chief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Panel Discussion
  • speaker photo
    Ankit Gupta
    Sr. Security Engineer, Exeter Finance LLC

    Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.

  • speaker photo
    Shilpi Mittal
    Lead IT Security Engineer, Tyson Foods

    Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.

    Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.

    Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.

  • speaker photo
    Panel Discussion
  • speaker photo
    Panel Discussion
  • speaker photo
    Bryce Carter, Moderator
    CISO, City of Arlington

    Bryce Carter is the Chief Information Security Officer for the City of Arlington, Texas, a major city known for its world-class entertainment district, where he leads an enterprise security office overseeing all critical infrastructure and essential services. He holds approximately 20 years of executive leadership experience across government, aviation, healthcare, utilities, and technology services. Recognized as a 2025 ORBIE Award Winner and named a Top 100 CISO Globally in 2025, he also serves on numerous advisory boards, mentors new and emerging leaders, and commits much of his time to the outdoors.

  • speaker photo
    Happy Hour
  • speaker photo
    George Al-Koura
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    George Kamide
    Co-Host, Bare Knuckles & Brass Tacks Podcast
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.