Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 8, 2025
    9:00 am
    [PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and Applications
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Kahn

    AI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.

    Lesson 1: What is Artificial Intelligence?
    Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.

    Lesson 2: What are the AI threats?
    Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.

    Lesson 3: What are the AI vulnerabilities?
    Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.

    Lesson 4: What are AI security controls?
    Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.

    Lesson 5: What is AI risk management?
    Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.

    Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
    One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data Cards

    Lesson 7: What are the AI governance, AI compliance, AI audit requirements?
    Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    Lesson 8: Building an AI security program
    Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.

    Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Delaplaine

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Thursday, October 9, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Saeman

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Denver ISSA Chapter Meeting - Open to all attendees
    • session level icon
    How I Got Caught: A Deep Dive Into an $800K Fraud
    speaker photo
    Author, "Blank Canvas: How I Reinvented My Life After Prison"
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Bresnan Boardroom

    This session offers a rare, firsthand account of how fraud happens from the inside out—how small rationalizations escalate into financial crimes and how internal controls fail to stop them.

    In “How I Got Caught,” Craig Stanland takes audiences beyond case studies and into the decision-making process behind an $800,000 fraud against a Fortune 500 company.

    We’ll examine the red flags his company missed, the internal controls he exploited, and the warning signs that could have stopped him sooner.

    We’ll also break down the investigative process, including the three key methods the victim and the FBI used to build their case. And we’ll explore how AI and emerging technology could have detected the fraud much earlier.

    This dynamic and interactive session provides internal auditors with actionable insights into strengthening internal controls, recognizing behavioral warning signs, and enhancing fraud detection—helping organizations prevent financial damage before it happens.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Human-Centered Cyber and AI
    • session level icon
    speaker photo
    Cyberpsychologist and 2x TEDx Speaker
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    What happens when machines become human-like? According to 2024 data breach investigation reports, human error is the cause of approximately 90% of data breaches. With the mass adoption of generative AI, this may lead to an increase in more sophisticated digital social engineering attempts.

    This talk examines how the brain interprets AI facial recognition, deepfake detection, the principles of influence employed in these attacks, and the future of social engineering. Humans are not the weakest link but are the best solution.

    Live tests will be conducted! Can you pass?

    9:45 am
    Networking Break and Cyber Connect
    • session level icon
    Coffee & Conversations
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall
    10:15 am
    From Submarines to Spacecraft: A Cybersecurity Journey Across the Mission Spectrum
    • session level icon
    speaker photo
    CISO, Sierra Space
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    Location / Room: ACA/Triax
    Join Air Force veteran and current Chief Information Security Officer Lisa Petersen as she shares her journey in the field of cybersecurity.  In this interactive breakout session, Lisa will explore the pivotal career moves, leadership lessons, and risk-based strategies that propelled her 20+ year career. Attendees will gain practical advice on navigating the cybersecurity field, bridging technical and executive roles, and building resilient security programs that align with national security and innovation priorities. Whether you’re an early-career professional or a senior leader, this session offers insights to help you grow with purpose and lead with impact.
    10:15 am
    Reignite a Thriving Life: An Intentional Growth Plan Is a Must-Have—Do You Have One?
    • session level icon
    speaker photo
    Global Head, Insider Threat, UBS
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    Location / Room: Bresnan Boardroom

    Attend this session and learn how. From Senior 20+ career leaders to newbies on the job, everyone should have a personal growth and prosperity plan. Newbies don’t know what they don’t know. Senior leaders and career professionals rightfully earned their initial success, but often end up plateauing or coasting. Further, it’s a tragedy of leadership that companies, teams and leaders are not intentionally mentoring them in the principles of personal growth and prosperity. Imagine the positive purpose, diligence and synergy that will radiate from a team where each member is energized in life with a personal growth plan. A growth plan designed to bring them into alignment with their vision of their own personal prosperity!! What’s your potential as a leader and/or team member where personal growth plans are part of the culture? One word – limitless!

    Whether you’re the CEO, the CEOs right hand man/woman, a senior or mid-level leader, just starting out, or a few years into your career – reignite your passion to relentlessly plan, achieve and live the prosperity you envision for yourself.

    In this session participants will :

    • Be taught the personal growth and prosperity plan model that studies show can achieve 95% success rate
    • Learn the one concept and technique that creates not just a diverse capable team, but an inspired, purpose and relationship-driven tribe
    • Actively participate in a 30 second hands on exercise that will “leader-shift” everyone in the room to a new perspective on the irreplaceable value of personal growth plans
    • Learn a simple 3-step goal setting technique they can use in their personal growth plan or energize their teams
    • Walk away with practical growth plan materials they can use later at home or at work to achieve the next level of personal or professional success in any area of life
    • Leave the session with THE SEED that can change the trajectory of their life and those they lead.

    Real, practical, everyday actionable information every leader needs to know and do. In this session, many leaders who just forgot their purpose will be reignited with a small but timely “reminder spark.”

    10:15 am
    Rethinking Security for the Modern Enterprise: Hybrid Mesh Firewall
    • session level icon
    speaker photo
    Security & Network Solutions Architect, C1
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am
    Location / Room: Delaplaine

    As digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.

    We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.

    Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.

    Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    11:10 am
    Cyberwar, Technology, Social Media, and Tyranny: Where Geopolitics, Information Warfare, and Cybersecurity Intersect
    • session level icon
    speaker photo
    Professor, University of Denver
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am
    Location / Room: ACA/Triax

    Cyber attackers are nothing if not innovative. Exploits, attack vectors, and players seemingly change on a daily basis, keeping the rest of us on our toes to ‘expect the unexpected’. But this is no longer just an issue of protecting organizations from the theft of IP, commercial trade secrets, or from devastating DDOS, ransomware, and other cyber extortion attacks. Today, cyber-attacks are quickly becoming an existential threat for survival for many organizations, especially critical national infrastructure industries being pushed to the edge of financial viability. The United States has seen hospitals close-up business following a cyberattack, while the impact of a power outage to a large urban population would quickly result in a public health crisis and mass casualty event.

    Organized crime and pariah national military and intelligence units are combining attack tools and sharing intelligence in-order-to take-down or weaken American institutions. This includes federal and state governments, education, healthcare, water, energy, and other critical national infrastructure industries which have come under increasing attack.

    The United States however is not the sole recipient of these attacks. Other NATO members have also been targeted. The timing of some of these apparent ‘cybercrime attacks’ cannot be overlooked. A Lockbit ransomware attack against the UK Royal Mail in 2023 followed directly on the heels of the UK providing new weapon systems to Ukraine for it to defend itself from Russian attacks on the battlefield.

    Some critical infrastructure attacks appear to be dry runs in case of future escalation, others, as in China’s case, have focused upon cyber espionage with its attacks against the Office of Personnel Management, Anthem Health, and Singapore Health to exact leverage in trade negotiations or to identify and erase undercover assets. Russia when its not shooting itself in the foot with poorly thought through attacks like NotPetya, has tended to focus more recently on disruption, misinformation, and disinformation campaigns, designed to create confusion and stroke existing divisions.

    The Colonial Pipeline ransomware attack panicked American consumers and created political stress for the government, while Russian interference in the 2016 election was designed to create confusion and inflame existing discontent, thus distracting governments by creating domestic social and political turmoil. The adaptation of 1950’s and 1960s’s KGB tactics to take advantage of the omnipresent use today of technology, and in particular social media, has changed the playing field. As a consequence, Russia and China have both invested heavily in troll farms, fake social media personas, and uber amplification of false narratives using AI bot networks in order to divide and weaken western capabilities. Today, they each direct millions of dollars per week at troll farms in a hybrid war against the west.

    As cyber defenders, we need to take a step back to see the big picture and understand the context in which individual cyberattacks take place today. That in turn, will help us to better design defensive strategies and tactics to thwart future attacks.

    11:10 am
    Securing Data Flow in the AI-Quantum Era
    • session level icon
    speaker photo
    Sr. Security Architect, Netskope
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am
    Location / Room: Delaplaine

    Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).

    Join this session to learn:

    • Choosing secure access methods for diverse use cases
    • Adapting security to risk, user behavior, and AI interactions
    • Preparing for post-quantum encryption’s enterprise impact
    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Principal Threat Analyst, Google Threat Intelligence Group
    speaker photo
    Sr. Solutions Engineer, AppOmni
    speaker photo
    VP, Solutions Architecture, 11:11 Systems
    speaker photo
    Identity Defense Global Operations Lead, Bank of America
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am
    Location / Room: Bresnan Boardroom

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Cyber Resilience: Preventing Your Next Cyberattack
    • session level icon
    speaker photo
    VP, Solutions Architecture, 11:11 Systems
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    Sprawling cloud infrastructure, remote and hybrid work, and ever more brazen threat actors have made it nearly infeasible to have an answer for every threat vector encroaching upon your organization. How can you withstand the onslaught of attacks?
    Let’s discuss how to build a comprehensive plan for preventing bad actors and malicious insiders from compromising your systems, disrupting your business operations, and harming your company’s brand.
    Key Takeaways:
    • What has changed in the last decade to lead to our current cyber crisis
    • Why have attack vectors grown in quantity and sophistication
    • What does a comprehensive cyber defense plan require
    • How our suite of managed cybersecurity services can serve as your multi-layered shield against the never-ending barrage of threats
    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Regulatory and Policy Impacts to Cybersecurity
    speaker photo
    President & CEO, Colorado Technology Association
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Saeman

    Session details to come.

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Meet the SecureWorld Advisory Council
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    Following lunch, join us in the Networking Lounge for coffee, conversation, and connections. Members of the SecureWorld Advisory Council will be walking the floor, giving you the chance to meet and engage directly with local cybersecurity leaders. This is a unique opportunity to expand your network, exchange ideas, and build relationships with experts who are helping shape the regional security community.

    1:15 pm
    The World's First AI Certification - ISO 42001: What We've Learned After One Year
    • session level icon
    speaker photo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman
    speaker photo
    Manager, AI Compliance & Cybersecurity, Schellman
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm
    Location / Room: ACA/Triax

    In 2024, Schellman became one of the first accredited certification bodies for ISO 42001, providing invaluable insights into AI governance. Our experience revealed that ISO 42001 equips organizations with a robust framework to navigate the complex landscape of AI regulation. By establishing clear guidelines for ethical AI practices, organizations can enhance transparency, accountability, and compliance. This standard not only helps mitigate risks associated with AI deployment but also fosters trust among stakeholders. We believe that ISO 42001 is essential for organizations striving to balance innovation with regulatory demands, ultimately paving the way for responsible AI adoption in diverse sectors.

    1:15 pm
    Frame by Frame: Deepfakes in the Wild and in Court
    • session level icon
    speaker photo
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm
    Location / Room: Delaplaine

    This presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility.

    We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images.

    AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court.

    We also cover tools and methodology used in deepfakes.

    1:15 pm
    [Panel] Proactive Security: Building Digital Fortresses Against Modern Dragons
    • session level icon
    speaker photo
    SVP, Technology Infrastructure and Security, Redwood Trust
    speaker photo
    Sr. Director, Advanced Security Solutions, Comcast Business
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm
    Location / Room: Bresnan Boardroom

    In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.

    This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.

    Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    What’s Keeping You Up at Night?
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    Head to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.

    2:10 pm
    Ugly Ducklings to Black Swans: Secure Hiring in Today’s Threat Landscape
    • session level icon
    speaker photo
    Identity Defense Global Operations Lead, Bank of America
    speaker photo
    SVP, Global Cyber Threat Evaluation, Bank of America
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    Location / Room: ACA/Triax

    Session details to come.

    2:10 pm
    Workforce Identity in the Age of Remote Deception
    • session level icon
    speaker photo
    CISO, TMF Health Quality Institute
    speaker photo
    Deputy CISO, TMF Health Quality Institute
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    Location / Room: Delaplaine

    In today’s remote-first world, ensuring that the people doing the work are actually who they claim to be has become a critical challenge. From North Korean agents posing as freelance developers to employees collecting full-time paychecks from three different companies, the risks are as real as they are hard to detect.

    This session will offer practical strategies for managing this complex problem. The solution requires close collaboration between Executives, Human Resources, Security, Compliance, and Supervisors. How do you create a program that balances the competing priorities of security and teamwork? How do you regularly validate workers while not giving the impression that “big brother is watching you”?

    Leave with new insights, sharper instincts, and a fresh perspective on modern workforce protection.

    2:10 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    VP of AI Strategy & Product Innovation, Dualboot Partners
    speaker photo
    Director, Sales Engineering, Cyberhaven
    speaker photo
    CISO, American Financing
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm
    Location / Room: Bresnan Boardroom

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    speaker photo
    CISO, American Financing
    speaker photo
    CISO, Colorado State University System
    speaker photo
    Global CISO, Stanley Black & Decker
    speaker photo
    CISO, City and County of Denver
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    Ever wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.

    Expect candid insights on topics like:

    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners

    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.

    3:45 pm
    Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:15 pm
    Location / Room: Networking Hall

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    Scan your badge at the Registration Desk to receive your CPE Certificate after Dash for Prizes.

Exhibitors
  • 11:11 Systems
    Booth: 190

    11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.

  • AppOmni
    Booth: 230

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Arctic Wolf Networks
    Booth: 290

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • C1 | Cisco
    Booth: 240

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Cloud Security Alliance Colorado Chapter
    Booth: 295

    The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry—and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.

  • Colorado = Security
    Booth: n/a

    Colorado = Security is the home for all things information security in Colorado. It’s your place to connect with the local security community, see the calendar of upcoming events, and, of course, listen to Colorado’s only security podcast.

  • Colorado Technology Association
    Booth: 110

    The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.

    At the Colorado Technology Association, we:

    – Lead an inclusive network that benefits our member community
    – Advocate for a pro-business and technology-friendly climate
    – Influence the development of a robust talent pipeline
    – Lead initiatives to help companies grow.

  • Comcast Business
    Booth: 170

    Comcast Business offers a broad suite of technology solutions to keep businesses of all sizes ready for what’s next. With a range of offerings including connectivity, secure networking, advanced cybersecurity, and unified communications solutions, Comcast Business is partnering with business and technology leaders across industries to help drive businesses forward.

  • Cyberhaven
    Booth: 180

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Dualboot Partners
    Booth: 150

    We build powerful digital solutions through a proven AI-driven process combining product, design, and engineering expertise to deliver business results. Through our DB90 methodology, we deliver custom software, AI development, data, security, and marketing services—building better and faster. We build software that builds your business. By combining visionary product leadership, top-tier engineering, and an AI-first approach, we deliver real business outcomes and act as true partners in your growth journey.

  • Exabeam
    Booth: 130

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Google Cloud
    Booth: 140

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Imprivata, Inc.
    Booth: 280

    Imprivata delivers access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata’s platform of innovative, interoperable access management and privileged access security solutions enable organizations to fully manage and secure all enterprise and third-party identities to facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership.

  • ISACA Denver Chapter
    Booth: 100

    The Denver Chapter of ISACA® (formerly EDPAA) was founded in June 1976 with just a handful of members. Today, the Denver chapter with over 1,040 members, is one of the largest chapters within the Southwestern Region. The Denver Chapter contributes to the international organization with financial support and periodic hosting of the International Conference.

    The Denver Chapter of ISACA® is a non-profit organization dedicated to the continued development and enhancement of the information systems audit and control profession by providing benefits to its members and to the professional community-at-large.

  • ISSA Denver Chapter
    Booth: 120

    ISSA Denver Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Motorola Solutions
    Booth: 270

    Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration that’s critical for safer communities, safer schools, safer hospitals and safer businesses.

  • Netskope + AWS
    Booth: 250

    Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.

  • Radiant Security
    Booth: 200

    Radiant Security’s Adaptive AI SOC platform is designed for enterprise security teams that want to address 100% of the alerts they receive from any tool or sensor. Ingesting, understanding, and triaging alerts from any security vendor or data source, Radiant ensures no real threats are missed, provides automated remediation, cutting response time from days to minutes, enabling analysts to focus on true positives and proactive security. Unlike other AI SOC solutions, which are constrained to predefined security use cases, Radiant dynamically addresses all security alerts, eliminating analyst burnout and the inefficiency of switching between multiple tools. Additionally, Radiant delivers affordable, high-performance log management directly from customers’ existing storage, dramatically reducing costs and eliminating vendor lock-in associated with traditional logging solutions.

  • Rapid7
    Booth: 220

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • ThreatLocker
    Booth: 210

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Wallarm
    Booth: 160

    Wallarm is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their APIs and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. Customers can deploy Wallarm to protect legacy and brand new cloud-native APIs. Wallarm’s multi-cloud platform delivers capabilities to secure businesses against existing and emerging API threats.

  • WiCyS Colorado Affiliate
    Booth: 299

    The Colorado WiCyS Affiliate offers mentoring, learning, networking and career development to women at all stages of their cybersecurity careers, Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.

    Our affiliate provides an online community for mentorship, networking, and collaboration as well as local meetups, community awareness programs, and support for other organizations with a common mission to bridge the Cybersecurity workforce gap while addressing diversity and inclusion of women and minorities.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Craig Stanland
    Author, "Blank Canvas: How I Reinvented My Life After Prison"
  • speaker photo
    Dr. Erik J. Huffman
    Cyberpsychologist and 2x TEDx Speaker

    Dr. Huffman is a founding researcher in the emerging field of Cyberpsychology, the study of how the human brain works while in a cyber environment. His research has begun to uncover biological deficiencies in humans that function for survival in face-to-face interaction, but does not activate in a cyber environment.

  • speaker photo
    Lisa Petersen
    CISO, Sierra Space

    Lisa Petersen is a cybersecurity leader and Air Force veteran with over 20 years of experience protecting mission-critical systems across government, aerospace, and manufacturing sectors. She currently serves as Chief Information Security Officer at Sierra Space, where she leads enterprise-wide cybersecurity strategy and classified operations. Lisa has overseen the implementation of $15M+ cybersecurity programs, secured national defense platforms and weapons systems, and partnered with NASA to achieve groundbreaking mission readiness milestones. A CISSP and PMP, she holds an M.S. in Information Security and Executive Leadership certification from Cornell. Her leadership philosophy blends technical depth with operational insight to drive security, resilience, and business value. 

  • speaker photo
    Gregg Braunton
    Global Head, Insider Threat, UBS

    A strategic security partner blended with deep operational, architecture, and compliance expertise. Innovative, strategic, and tactical security leadership utilizing "business aligned" and "data-driven" cybersecurity models and frameworks. Gregg has 20+ years extensive cyber expertise leading and delivering cybersecurity operations, architecture, and security risk life-cycle management in highly compliant driven risk frameworks: HIPAA, FISMA, NIST, HiTrust. TOP SECRET CLEARANCE.

  • speaker photo
    Craig Rees
    Security & Network Solutions Architect, C1

    Craig Rees is an experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.

  • speaker photo
    Richard Staynings
    Professor, University of Denver

    Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.

    Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.

    A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA

    Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.

  • speaker photo
    Paul "PK" Kellett
    Sr. Security Architect, Netskope

    PK has worked in the private sector for 15 years leading network and security operations teams before pivoting to a security engineer role for leading cyber vendors over the last decade. Today, he is supporting global GSI companies delivering industry leading SASE solutions from Netskope to Fortune 500 companies.

  • speaker photo
    Austin Larsen
    Principal Threat Analyst, Google Threat Intelligence Group

    Austin Larsen is a Principal Threat Analyst with the Google Threat Intelligence Group. Austin leads rapid response and investigation coordination for major global cyber events. Driving threat research, communication strategies, and response to safeguard Google's users and global customer base. Previously, Austin spent time on Mandiant’s Advanced Practices team clustering and attributing advanced cyber threat activity. Austin was also a Senior Incident Response Consultant at Mandiant where he specialized in helping hundreds of organizations respond to attacks from nation-state actors and advanced threat groups.

  • speaker photo
    Terry Olaes
    Sr. Solutions Engineer, AppOmni

    Terry has been working alongside security practitioners to advise on challenges around SaaS security, threat exposure, security policy, and managing attack surfaces for the past 10 years. His insights come from 15+ years supporting global enterprises like MCI Worldcom, Gap Inc., IBM, and Neiman Marcus Group with architecting, engineering, securing, and auditing hybrid infrastructure environments. He enjoys building bridges between technology and the business teams to reduce the friction typically inherent in securing the enterprise.

  • speaker photo
    Jeff Polczynski
    VP, Solutions Architecture, 11:11 Systems

    Jeff T. Polczynski is the VP of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking, and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.

  • speaker photo
    Lauren Hearn, Moderator
    Identity Defense Global Operations Lead, Bank of America
  • speaker photo
    Jeff Polczynski
    VP, Solutions Architecture, 11:11 Systems

    Jeff T. Polczynski is the VP of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking, and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.

  • speaker photo
    Brittany Morris Saunders, Moderator
    President & CEO, Colorado Technology Association
  • speaker photo
    Danny Manimbo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman

    Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)

  • speaker photo
    Joe Sigman
    Manager, AI Compliance & Cybersecurity, Schellman
  • speaker photo
    Jared Lobato
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service

    With a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification.  Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.

  • speaker photo
    Jason Newman
    SVP, Technology Infrastructure and Security, Redwood Trust

    Jason Newman is a seasoned technology executive with deep expertise in cybersecurity, infrastructure management, and enterprise resilience. As SVP of Infrastructure and Security (CISO), he leads strategic initiatives that safeguard critical systems, optimize performance, and drive innovation across complex IT environments. With a proven track record of aligning cybersecurity and infrastructure strategies with business goals, Jason is passionate about building secure, scalable, and future-ready technology ecosystems. He is known for his leadership in transforming operations, enhancing risk posture, and fostering cross-functional collaboration to deliver measurable impact.

  • speaker photo
    Trevor Parks
    Sr. Director, Advanced Security Solutions, Comcast Business

    With a cybersecurity career spanning 24 years, Trevor Parks has a deep understanding of the challenges facing today's IT landscape. From his time as a penetration tester to his current role leading a team of security experts, he has consistently been at the forefront of the industry. A veteran of the United States Air Force and a respected keynote speaker at events like Black Hat and Def Con, Trevor is dedicated to helping organizations improve their cyber resilience. On a personal note, he is also a four-time competitor on the popular television show American Ninja Warrior, a testament to his focus and determination.

  • speaker photo
    Kip Boyle, Moderator
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Lauren Hearn
    Identity Defense Global Operations Lead, Bank of America
  • speaker photo
    Ryan Nielsen
    SVP, Global Cyber Threat Evaluation, Bank of America
  • speaker photo
    Justin Armstrong
    CISO, TMF Health Quality Institute

    Justin Armstrong is a security, privacy, and regulatory compliance leader with over 25 years of experience in the Healthcare Industry. He led Product Security at MEDITECH, a top three Electronic Health Record vendor, and has helped numerous organizations as a fractional CISO. He has engaged with Hospitals in nearly 100 ransomware incidents, and is dedicated to securing Healthcare and Critical Infrastructure. Justin is a contributor to the IEEE/UL 2933™ Standard for Clinical IoT Data and Device Interoperability with TIPPSS — Trust, Identity, Privacy, Protection, Safety, and Security, which defines secure and interoperable practices for connected healthcare systems.

    He holds the CISSP, CCSP, and HCISPP certifications and obtained his Masters in Cybersecurity Leadership at Brandeis University.

  • speaker photo
    Ben Focht
    Deputy CISO, TMF Health Quality Institute

    Ben is a cybersecurity leader with over a decade of experience shaping and scaling security programs across diverse industries including healthcare, finance, and education. From building red teams and security operations centers to leading executive strategy and cultural transformation, his career spans nearly every dimension of the cyber landscape.

    Throughout his career, Ben has been driven by a belief that successful cybersecurity is built not just on controls and compliance, but on culture, communication, and continuous improvement. He's known for turning complex challenges into collaborative solutions whether guiding incident response, launching DevSecQps initiatives, or mentoring the next generation of security professionals.

    A Colorado native with a deep passion for building teams and growing successful programs, Ben sees his ideal role as that of a cyber culture architect, fostering environments where security becomes second nature, not an afterthought. His presentations blend real-world experience with practical takeaways and a human-centered approach that resonates across technical and executive audiences alike.

  • speaker photo
    Billy Boozer
    VP of AI Strategy & Product Innovation, Dualboot Partners
  • speaker photo
    Brian Hileman
    Director, Sales Engineering, Cyberhaven

    Brian has over a decade of experience in data protection, specializing in DLP and Insider Risk Management. As Cyberhaven’s Director of Sales Engineering and creator of DLPTest.com, he has held key roles at Palo Alto Networks, Digital Guardian, and InteliSecure, and regularly shares insights at conferences like ISSA, CSA, and RMISC.

  • speaker photo
    Rohbair Jean, Moderator
    CISO, American Financing
  • speaker photo
    Rohbair Jean
    CISO, American Financing
  • speaker photo
    Steven Lovaas
    CISO, Colorado State University System

    Steve Lovaas started using a Macintosh within weeks of the 1984 Super Bowl commercial. But he didn't switch careers from singing opera to securing information systems until returning home to Colorado in the era of Windows NT—adding Cisco certs and a couple of additional degrees to launch an IT career. Steve was a student in the inaugural class of one of the first security Masters programs (the Norwich University Master of Science in Information Assurance), and started with the first class of PhD students in Public Communication & Technology at Colorado State University. Along the way, his studies in music, philosophy, languages, marine science, chemistry, and computer networking reflected his curiosity and love of learning, which he continues to exercise as the CISO at Colorado State University. Steve's publications and presentations have taken him across oceans and national borders, but he is most fascinated by the borders we continue to erect between and among ourselves in an effort to feel safe. He hopes that a deep and mindful attention to security and privacy as we continue to innovate with computer technologies will help us remember why we build these borders... and what they're not good for.

  • speaker photo
    Lucia Milică Stacy
    Global CISO, Stanley Black & Decker

    Lucia Milică Stacy serves as Global Chief Information Security Officer at Stanley Black & Decker, Inc, a Fortune 500 American manufacturer of industrial tools and household hardware. She is a senior technology leader with extensive technical and business experience. In her previous role, Lucia was the VP, Global Resident CISO at Proofpoint, a leading cybersecurity company. Additionally, she served as VP, Chief Information Security Officer & Chief Privacy Officer for Polycom, where she managed all aspects of data privacy and information security. She has also held leadership and technical roles in IT governance & strategy, security risk and compliance, corporate and product security, data privacy, and IT infrastructure at other companies, including HP, Palm, Wells Fargo, and Franklin Templeton. She has also extended her contributions to her profession by serving as an advisory board member and active participant with the cybersecurity industry and relevant industry groups, including policy council and board membership on the National Technology Security Coalition, and service with the Department of Health and Human Services (HHS) 405(d) Cybersecurity Task Group, SC Media Advisory Board, and Forbes Technology Council. Lucia has been featured in Harvard Business Review and The Wall Street Journal and is the recipient of the 2023 Cybersecurity Women of the Year Award, 2024 Top Global CISOs by Cyber Defense Magazine, Cyber25 Women of Impact by Team8 and NYSE to name a few. She has a Master of Science in Information and Cybersecurity degree from the University of California, Berkeley. Lucia also holds Master in Business Administration and Juris Doctorate degrees.

  • speaker photo
    Merlin Namuth, Moderator
    CISO, City and County of Denver

    Merlin Namuth is CISO at City and County of Denver. He has worked in cybersecurity for over 26 years. His comprehensive experience spanning several industries includes leading 6 different security programs, creating strategy and building security programs from the ground up, advancing existing security programs, mergers & acquisitions, managing incident response teams, digital forensics, compliance, architecture, and engineering complex security solutions. Namuth has served as an advisor to security startup companies. He has presented at numerous conferences, including RSA Conference 6 times both domestically and internationally, been interviewed on renowned security podcasts, and frequently writes blogs and articles.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes