Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 8, 20259:00 am[PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: KahnAI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.
Lesson 1: What is Artificial Intelligence?
Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.Lesson 2: What are the AI threats?
Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.Lesson 3: What are the AI vulnerabilities?
Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.Lesson 4: What are AI security controls?
Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.Lesson 5: What is AI risk management?
Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data CardsLesson 7: What are the AI governance, AI compliance, AI audit requirements?
Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.Lesson 8: Building an AI security program
Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursvCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: DelaplaineThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, October 9, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:30 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amLocation / Room: SaemanModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amDenver ISSA Chapter Meeting - Open to all attendeesHow I Got Caught: A Deep Dive Into an $800K FraudAuthor, "Blank Canvas: How I Reinvented My Life After Prison"Registration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: Bresnan BoardroomThis session offers a rare, firsthand account of how fraud happens from the inside out—how small rationalizations escalate into financial crimes and how internal controls fail to stop them.
In “How I Got Caught,” Craig Stanland takes audiences beyond case studies and into the decision-making process behind an $800,000 fraud against a Fortune 500 company.
We’ll examine the red flags his company missed, the internal controls he exploited, and the warning signs that could have stopped him sooner.
We’ll also break down the investigative process, including the three key methods the victim and the FBI used to build their case. And we’ll explore how AI and emerging technology could have detected the fraud much earlier.
This dynamic and interactive session provides internal auditors with actionable insights into strengthening internal controls, recognizing behavioral warning signs, and enhancing fraud detection—helping organizations prevent financial damage before it happens.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Human-Centered Cyber and AICyberpsychologist and 2x TEDx SpeakerRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterWhat happens when machines become human-like? According to 2024 data breach investigation reports, human error is the cause of approximately 90% of data breaches. With the mass adoption of generative AI, this may lead to an increase in more sophisticated digital social engineering attempts.
This talk examines how the brain interprets AI facial recognition, deepfake detection, the principles of influence employed in these attacks, and the future of social engineering. Humans are not the weakest link but are the best solution.
Live tests will be conducted! Can you pass?
9:45 amNetworking Break and Cyber ConnectCoffee & ConversationsRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking Hall10:15 amFrom Submarines to Spacecraft: A Cybersecurity Journey Across the Mission SpectrumCISO, Sierra SpaceRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: ACA/TriaxJoin Air Force veteran and current Chief Information Security Officer Lisa Petersen as she shares her journey in the field of cybersecurity. In this interactive breakout session, Lisa will explore the pivotal career moves, leadership lessons, and risk-based strategies that propelled her 20+ year career. Attendees will gain practical advice on navigating the cybersecurity field, bridging technical and executive roles, and building resilient security programs that align with national security and innovation priorities. Whether you’re an early-career professional or a senior leader, this session offers insights to help you grow with purpose and lead with impact.10:15 amReignite a Thriving Life: An Intentional Growth Plan Is a Must-Have—Do You Have One?Global Head, Insider Threat, UBSRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: Bresnan BoardroomAttend this session and learn how. From Senior 20+ career leaders to newbies on the job, everyone should have a personal growth and prosperity plan. Newbies don’t know what they don’t know. Senior leaders and career professionals rightfully earned their initial success, but often end up plateauing or coasting. Further, it’s a tragedy of leadership that companies, teams and leaders are not intentionally mentoring them in the principles of personal growth and prosperity. Imagine the positive purpose, diligence and synergy that will radiate from a team where each member is energized in life with a personal growth plan. A growth plan designed to bring them into alignment with their vision of their own personal prosperity!! What’s your potential as a leader and/or team member where personal growth plans are part of the culture? One word – limitless!
Whether you’re the CEO, the CEOs right hand man/woman, a senior or mid-level leader, just starting out, or a few years into your career – reignite your passion to relentlessly plan, achieve and live the prosperity you envision for yourself.
In this session participants will :
- Be taught the personal growth and prosperity plan model that studies show can achieve 95% success rate
- Learn the one concept and technique that creates not just a diverse capable team, but an inspired, purpose and relationship-driven tribe
- Actively participate in a 30 second hands on exercise that will “leader-shift” everyone in the room to a new perspective on the irreplaceable value of personal growth plans
- Learn a simple 3-step goal setting technique they can use in their personal growth plan or energize their teams
- Walk away with practical growth plan materials they can use later at home or at work to achieve the next level of personal or professional success in any area of life
- Leave the session with THE SEED that can change the trajectory of their life and those they lead.
Real, practical, everyday actionable information every leader needs to know and do. In this session, many leaders who just forgot their purpose will be reignited with a small but timely “reminder spark.”
10:15 amRethinking Security for the Modern Enterprise: Hybrid Mesh FirewallSecurity & Network Solutions Architect, C1Registration Level:
Open Sessions
10:15 am - 10:50 amLocation / Room: DelaplaineAs digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.
We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.
Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.
Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.
10:50 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
11:10 amCyberwar, Technology, Social Media, and Tyranny: Where Geopolitics, Information Warfare, and Cybersecurity IntersectProfessor, University of DenverRegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: ACA/TriaxCyber attackers are nothing if not innovative. Exploits, attack vectors, and players seemingly change on a daily basis, keeping the rest of us on our toes to ‘expect the unexpected’. But this is no longer just an issue of protecting organizations from the theft of IP, commercial trade secrets, or from devastating DDOS, ransomware, and other cyber extortion attacks. Today, cyber-attacks are quickly becoming an existential threat for survival for many organizations, especially critical national infrastructure industries being pushed to the edge of financial viability. The United States has seen hospitals close-up business following a cyberattack, while the impact of a power outage to a large urban population would quickly result in a public health crisis and mass casualty event.
Organized crime and pariah national military and intelligence units are combining attack tools and sharing intelligence in-order-to take-down or weaken American institutions. This includes federal and state governments, education, healthcare, water, energy, and other critical national infrastructure industries which have come under increasing attack.
The United States however is not the sole recipient of these attacks. Other NATO members have also been targeted. The timing of some of these apparent ‘cybercrime attacks’ cannot be overlooked. A Lockbit ransomware attack against the UK Royal Mail in 2023 followed directly on the heels of the UK providing new weapon systems to Ukraine for it to defend itself from Russian attacks on the battlefield.
Some critical infrastructure attacks appear to be dry runs in case of future escalation, others, as in China’s case, have focused upon cyber espionage with its attacks against the Office of Personnel Management, Anthem Health, and Singapore Health to exact leverage in trade negotiations or to identify and erase undercover assets. Russia when its not shooting itself in the foot with poorly thought through attacks like NotPetya, has tended to focus more recently on disruption, misinformation, and disinformation campaigns, designed to create confusion and stroke existing divisions.
The Colonial Pipeline ransomware attack panicked American consumers and created political stress for the government, while Russian interference in the 2016 election was designed to create confusion and inflame existing discontent, thus distracting governments by creating domestic social and political turmoil. The adaptation of 1950’s and 1960s’s KGB tactics to take advantage of the omnipresent use today of technology, and in particular social media, has changed the playing field. As a consequence, Russia and China have both invested heavily in troll farms, fake social media personas, and uber amplification of false narratives using AI bot networks in order to divide and weaken western capabilities. Today, they each direct millions of dollars per week at troll farms in a hybrid war against the west.
As cyber defenders, we need to take a step back to see the big picture and understand the context in which individual cyberattacks take place today. That in turn, will help us to better design defensive strategies and tactics to thwart future attacks.
11:10 amSecuring Data Flow in the AI-Quantum EraSr. Security Architect, NetskopeRegistration Level:
Open Sessions
11:10 am - 11:45 amLocation / Room: DelaplaineSensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).
Join this session to learn:
-
Choosing secure access methods for diverse use cases
-
Adapting security to risk, user behavior, and AI interactions
-
Preparing for post-quantum encryption’s enterprise impact
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResiliencePrincipal Threat Analyst, Google Threat Intelligence GroupSr. Solutions Engineer, AppOmniVP, Solutions Architecture, 11:11 SystemsIdentity Defense Global Operations Lead, Bank of AmericaRegistration Level:
Open Sessions
11:10 am - 11:45 amLocation / Room: Bresnan BoardroomToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Cyber Resilience: Preventing Your Next CyberattackVP, Solutions Architecture, 11:11 SystemsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSprawling cloud infrastructure, remote and hybrid work, and ever more brazen threat actors have made it nearly infeasible to have an answer for every threat vector encroaching upon your organization. How can you withstand the onslaught of attacks?Let’s discuss how to build a comprehensive plan for preventing bad actors and malicious insiders from compromising your systems, disrupting your business operations, and harming your company’s brand.Key Takeaways:- What has changed in the last decade to lead to our current cyber crisis
- Why have attack vectors grown in quantity and sophistication
- What does a comprehensive cyber defense plan require
- How our suite of managed cybersecurity services can serve as your multi-layered shield against the never-ending barrage of threats
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Regulatory and Policy Impacts to CybersecurityPresident & CEO, Colorado Technology AssociationRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: SaemanSession details to come.
Moderated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectMeet the SecureWorld Advisory CouncilRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallFollowing lunch, join us in the Networking Lounge for coffee, conversation, and connections. Members of the SecureWorld Advisory Council will be walking the floor, giving you the chance to meet and engage directly with local cybersecurity leaders. This is a unique opportunity to expand your network, exchange ideas, and build relationships with experts who are helping shape the regional security community.
1:15 pmThe World's First AI Certification - ISO 42001: What We've Learned After One YearPrincipal | ISO Practice Director | AI Assessment Leader, SchellmanManager, AI Compliance & Cybersecurity, SchellmanRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: ACA/TriaxIn 2024, Schellman became one of the first accredited certification bodies for ISO 42001, providing invaluable insights into AI governance. Our experience revealed that ISO 42001 equips organizations with a robust framework to navigate the complex landscape of AI regulation. By establishing clear guidelines for ethical AI practices, organizations can enhance transparency, accountability, and compliance. This standard not only helps mitigate risks associated with AI deployment but also fosters trust among stakeholders. We believe that ISO 42001 is essential for organizations striving to balance innovation with regulatory demands, ultimately paving the way for responsible AI adoption in diverse sectors.
1:15 pmFrame by Frame: Deepfakes in the Wild and in CourtNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: DelaplaineThis presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility.
We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images.
AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court.
We also cover tools and methodology used in deepfakes.
1:15 pm[Panel] Proactive Security: Building Digital Fortresses Against Modern DragonsSVP, Technology Infrastructure and Security, Redwood TrustSr. Director, Advanced Security Solutions, Comcast BusinessvCISO, Cyber Risk Opportunities LLCRegistration Level:
Open Sessions
1:15 pm - 1:50 pmLocation / Room: Bresnan BoardroomIn the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.
This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.
Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pmUgly Ducklings to Black Swans: Secure Hiring in Today’s Threat LandscapeIdentity Defense Global Operations Lead, Bank of AmericaSVP, Global Cyber Threat Evaluation, Bank of AmericaRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: ACA/TriaxSession details to come.
2:10 pmWorkforce Identity in the Age of Remote DeceptionCISO, TMF Health Quality InstituteDeputy CISO, TMF Health Quality InstituteRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: DelaplaineIn today’s remote-first world, ensuring that the people doing the work are actually who they claim to be has become a critical challenge. From North Korean agents posing as freelance developers to employees collecting full-time paychecks from three different companies, the risks are as real as they are hard to detect.
This session will offer practical strategies for managing this complex problem. The solution requires close collaboration between Executives, Human Resources, Security, Compliance, and Supervisors. How do you create a program that balances the competing priorities of security and teamwork? How do you regularly validate workers while not giving the impression that “big brother is watching you”?
Leave with new insights, sharper instincts, and a fresh perspective on modern workforce protection.
2:10 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityVP of AI Strategy & Product Innovation, Dualboot PartnersDirector, Sales Engineering, CyberhavenCISO, American FinancingRegistration Level:
Open Sessions
2:10 pm - 2:45 pmLocation / Room: Bresnan BoardroomAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityCISO, American FinancingCISO, Colorado State University SystemGlobal CISO, Stanley Black & DeckerCISO, City and County of DenverRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.
Expect candid insights on topics like:
- The toughest decisions CISOs face daily
- Emerging threats and how security leaders are preparing
- The future of security operations, compliance, and resilience
- Strategies for bridging the gap between security teams and executive leadership
- Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.
3:45 pmDash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:15 pmLocation / Room: Networking HallParticipating sponsors will announce their Dash for Prizes winners. Must be present to win.
Scan your badge at the Registration Desk to receive your CPE Certificate after Dash for Prizes.
- 11:11 SystemsBooth: 190
11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.
- AppOmniBooth: 230
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- Arctic Wolf NetworksBooth: 290
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- C1 | CiscoBooth: 240
C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- Cloud Security Alliance Colorado ChapterBooth: 295
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry—and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.
- Colorado = SecurityBooth: n/a
Colorado = Security is the home for all things information security in Colorado. It’s your place to connect with the local security community, see the calendar of upcoming events, and, of course, listen to Colorado’s only security podcast.
- Colorado Technology AssociationBooth: 110
The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.
At the Colorado Technology Association, we:
– Lead an inclusive network that benefits our member community
– Advocate for a pro-business and technology-friendly climate
– Influence the development of a robust talent pipeline
– Lead initiatives to help companies grow. - Comcast BusinessBooth: 170
Comcast Business offers a broad suite of technology solutions to keep businesses of all sizes ready for what’s next. With a range of offerings including connectivity, secure networking, advanced cybersecurity, and unified communications solutions, Comcast Business is partnering with business and technology leaders across industries to help drive businesses forward.
- CyberhavenBooth: 180
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- Dualboot PartnersBooth: 150
We build powerful digital solutions through a proven AI-driven process combining product, design, and engineering expertise to deliver business results. Through our DB90 methodology, we deliver custom software, AI development, data, security, and marketing services—building better and faster. We build software that builds your business. By combining visionary product leadership, top-tier engineering, and an AI-first approach, we deliver real business outcomes and act as true partners in your growth journey.
- ExabeamBooth: 130
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- Google CloudBooth: 140
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Imprivata, Inc.Booth: 280
Imprivata delivers access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata’s platform of innovative, interoperable access management and privileged access security solutions enable organizations to fully manage and secure all enterprise and third-party identities to facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership.
- ISACA Denver ChapterBooth: 100
The Denver Chapter of ISACA® (formerly EDPAA) was founded in June 1976 with just a handful of members. Today, the Denver chapter with over 1,040 members, is one of the largest chapters within the Southwestern Region. The Denver Chapter contributes to the international organization with financial support and periodic hosting of the International Conference.
The Denver Chapter of ISACA® is a non-profit organization dedicated to the continued development and enhancement of the information systems audit and control profession by providing benefits to its members and to the professional community-at-large.
- ISSA Denver ChapterBooth: 120
ISSA Denver Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.
- Motorola SolutionsBooth: 270
Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration that’s critical for safer communities, safer schools, safer hospitals and safer businesses.
- Netskope + AWSBooth: 250
Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.
- Radiant SecurityBooth: 200
Radiant Security’s Adaptive AI SOC platform is designed for enterprise security teams that want to address 100% of the alerts they receive from any tool or sensor. Ingesting, understanding, and triaging alerts from any security vendor or data source, Radiant ensures no real threats are missed, provides automated remediation, cutting response time from days to minutes, enabling analysts to focus on true positives and proactive security. Unlike other AI SOC solutions, which are constrained to predefined security use cases, Radiant dynamically addresses all security alerts, eliminating analyst burnout and the inefficiency of switching between multiple tools. Additionally, Radiant delivers affordable, high-performance log management directly from customers’ existing storage, dramatically reducing costs and eliminating vendor lock-in associated with traditional logging solutions.
- Rapid7Booth: 220
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- ThreatLockerBooth: 210
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WallarmBooth: 160
Wallarm is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their APIs and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. Customers can deploy Wallarm to protect legacy and brand new cloud-native APIs. Wallarm’s multi-cloud platform delivers capabilities to secure businesses against existing and emerging API threats.
- WiCyS Colorado AffiliateBooth: 299
The Colorado WiCyS Affiliate offers mentoring, learning, networking and career development to women at all stages of their cybersecurity careers, Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.
Our affiliate provides an online community for mentorship, networking, and collaboration as well as local meetups, community awareness programs, and support for other organizations with a common mission to bridge the Cybersecurity workforce gap while addressing diversity and inclusion of women and minorities.
Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson CyberLarry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Craig StanlandAuthor, "Blank Canvas: How I Reinvented My Life After Prison"
Dr. Erik J. HuffmanCyberpsychologist and 2x TEDx SpeakerDr. Huffman is a founding researcher in the emerging field of Cyberpsychology, the study of how the human brain works while in a cyber environment. His research has begun to uncover biological deficiencies in humans that function for survival in face-to-face interaction, but does not activate in a cyber environment.
Lisa PetersenCISO, Sierra SpaceLisa Petersen is a cybersecurity leader and Air Force veteran with over 20 years of experience protecting mission-critical systems across government, aerospace, and manufacturing sectors. She currently serves as Chief Information Security Officer at Sierra Space, where she leads enterprise-wide cybersecurity strategy and classified operations. Lisa has overseen the implementation of $15M+ cybersecurity programs, secured national defense platforms and weapons systems, and partnered with NASA to achieve groundbreaking mission readiness milestones. A CISSP and PMP, she holds an M.S. in Information Security and Executive Leadership certification from Cornell. Her leadership philosophy blends technical depth with operational insight to drive security, resilience, and business value.
Gregg BrauntonGlobal Head, Insider Threat, UBSA strategic security partner blended with deep operational, architecture, and compliance expertise. Innovative, strategic, and tactical security leadership utilizing "business aligned" and "data-driven" cybersecurity models and frameworks. Gregg has 20+ years extensive cyber expertise leading and delivering cybersecurity operations, architecture, and security risk life-cycle management in highly compliant driven risk frameworks: HIPAA, FISMA, NIST, HiTrust. TOP SECRET CLEARANCE.
Craig ReesSecurity & Network Solutions Architect, C1Craig Rees is an experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.
Richard StayningsProfessor, University of DenverRichard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.
Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.
A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA
Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.
Paul "PK" KellettSr. Security Architect, NetskopePK has worked in the private sector for 15 years leading network and security operations teams before pivoting to a security engineer role for leading cyber vendors over the last decade. Today, he is supporting global GSI companies delivering industry leading SASE solutions from Netskope to Fortune 500 companies.
Austin LarsenPrincipal Threat Analyst, Google Threat Intelligence GroupAustin Larsen is a Principal Threat Analyst with the Google Threat Intelligence Group. Austin leads rapid response and investigation coordination for major global cyber events. Driving threat research, communication strategies, and response to safeguard Google's users and global customer base. Previously, Austin spent time on Mandiant’s Advanced Practices team clustering and attributing advanced cyber threat activity. Austin was also a Senior Incident Response Consultant at Mandiant where he specialized in helping hundreds of organizations respond to attacks from nation-state actors and advanced threat groups.
Terry OlaesSr. Solutions Engineer, AppOmniTerry has been working alongside security practitioners to advise on challenges around SaaS security, threat exposure, security policy, and managing attack surfaces for the past 10 years. His insights come from 15+ years supporting global enterprises like MCI Worldcom, Gap Inc., IBM, and Neiman Marcus Group with architecting, engineering, securing, and auditing hybrid infrastructure environments. He enjoys building bridges between technology and the business teams to reduce the friction typically inherent in securing the enterprise.
Jeff PolczynskiVP, Solutions Architecture, 11:11 SystemsJeff T. Polczynski is the VP of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking, and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.
Lauren Hearn, ModeratorIdentity Defense Global Operations Lead, Bank of America
Jeff PolczynskiVP, Solutions Architecture, 11:11 SystemsJeff T. Polczynski is the VP of Solutions Architecture at 11:11 Systems. Previously, he was a key member of the Network Engineering team, where he helped design and build the network infrastructure for the 11:11 Cloud. Jeff has more than 20 years of experience in data center, networking, and security roles across government, financial services, and service provider companies. Outside of work, he loves backpacking and is always on the lookout for the perfect spot to hang his hammock for a night under the stars.
Brittany Morris Saunders, ModeratorPresident & CEO, Colorado Technology Association
Danny ManimboPrincipal | ISO Practice Director | AI Assessment Leader, SchellmanDanny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)
Joe SigmanManager, AI Compliance & Cybersecurity, Schellman
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Jason NewmanSVP, Technology Infrastructure and Security, Redwood TrustJason Newman is a seasoned technology executive with deep expertise in cybersecurity, infrastructure management, and enterprise resilience. As SVP of Infrastructure and Security (CISO), he leads strategic initiatives that safeguard critical systems, optimize performance, and drive innovation across complex IT environments. With a proven track record of aligning cybersecurity and infrastructure strategies with business goals, Jason is passionate about building secure, scalable, and future-ready technology ecosystems. He is known for his leadership in transforming operations, enhancing risk posture, and fostering cross-functional collaboration to deliver measurable impact.
Trevor ParksSr. Director, Advanced Security Solutions, Comcast BusinessWith a cybersecurity career spanning 24 years, Trevor Parks has a deep understanding of the challenges facing today's IT landscape. From his time as a penetration tester to his current role leading a team of security experts, he has consistently been at the forefront of the industry. A veteran of the United States Air Force and a respected keynote speaker at events like Black Hat and Def Con, Trevor is dedicated to helping organizations improve their cyber resilience. On a personal note, he is also a four-time competitor on the popular television show American Ninja Warrior, a testament to his focus and determination.
Kip Boyle, ModeratorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Lauren HearnIdentity Defense Global Operations Lead, Bank of America
Ryan NielsenSVP, Global Cyber Threat Evaluation, Bank of America
Justin ArmstrongCISO, TMF Health Quality InstituteJustin Armstrong is a security, privacy, and regulatory compliance leader with over 25 years of experience in the Healthcare Industry. He led Product Security at MEDITECH, a top three Electronic Health Record vendor, and has helped numerous organizations as a fractional CISO. He has engaged with Hospitals in nearly 100 ransomware incidents, and is dedicated to securing Healthcare and Critical Infrastructure. Justin is a contributor to the IEEE/UL 2933™ Standard for Clinical IoT Data and Device Interoperability with TIPPSS — Trust, Identity, Privacy, Protection, Safety, and Security, which defines secure and interoperable practices for connected healthcare systems.
He holds the CISSP, CCSP, and HCISPP certifications and obtained his Masters in Cybersecurity Leadership at Brandeis University.
Ben FochtDeputy CISO, TMF Health Quality InstituteBen is a cybersecurity leader with over a decade of experience shaping and scaling security programs across diverse industries including healthcare, finance, and education. From building red teams and security operations centers to leading executive strategy and cultural transformation, his career spans nearly every dimension of the cyber landscape.
Throughout his career, Ben has been driven by a belief that successful cybersecurity is built not just on controls and compliance, but on culture, communication, and continuous improvement. He's known for turning complex challenges into collaborative solutions whether guiding incident response, launching DevSecQps initiatives, or mentoring the next generation of security professionals.
A Colorado native with a deep passion for building teams and growing successful programs, Ben sees his ideal role as that of a cyber culture architect, fostering environments where security becomes second nature, not an afterthought. His presentations blend real-world experience with practical takeaways and a human-centered approach that resonates across technical and executive audiences alike.

Brian HilemanDirector, Sales Engineering, CyberhavenBrian has over a decade of experience in data protection, specializing in DLP and Insider Risk Management. As Cyberhaven’s Director of Sales Engineering and creator of DLPTest.com, he has held key roles at Palo Alto Networks, Digital Guardian, and InteliSecure, and regularly shares insights at conferences like ISSA, CSA, and RMISC.
Rohbair Jean, ModeratorCISO, American Financing
Rohbair JeanCISO, American Financing
Steven LovaasCISO, Colorado State University SystemSteve Lovaas started using a Macintosh within weeks of the 1984 Super Bowl commercial. But he didn't switch careers from singing opera to securing information systems until returning home to Colorado in the era of Windows NT—adding Cisco certs and a couple of additional degrees to launch an IT career. Steve was a student in the inaugural class of one of the first security Masters programs (the Norwich University Master of Science in Information Assurance), and started with the first class of PhD students in Public Communication & Technology at Colorado State University. Along the way, his studies in music, philosophy, languages, marine science, chemistry, and computer networking reflected his curiosity and love of learning, which he continues to exercise as the CISO at Colorado State University. Steve's publications and presentations have taken him across oceans and national borders, but he is most fascinated by the borders we continue to erect between and among ourselves in an effort to feel safe. He hopes that a deep and mindful attention to security and privacy as we continue to innovate with computer technologies will help us remember why we build these borders... and what they're not good for.
Lucia Milică StacyGlobal CISO, Stanley Black & DeckerLucia Milică Stacy serves as Global Chief Information Security Officer at Stanley Black & Decker, Inc, a Fortune 500 American manufacturer of industrial tools and household hardware. She is a senior technology leader with extensive technical and business experience. In her previous role, Lucia was the VP, Global Resident CISO at Proofpoint, a leading cybersecurity company. Additionally, she served as VP, Chief Information Security Officer & Chief Privacy Officer for Polycom, where she managed all aspects of data privacy and information security. She has also held leadership and technical roles in IT governance & strategy, security risk and compliance, corporate and product security, data privacy, and IT infrastructure at other companies, including HP, Palm, Wells Fargo, and Franklin Templeton. She has also extended her contributions to her profession by serving as an advisory board member and active participant with the cybersecurity industry and relevant industry groups, including policy council and board membership on the National Technology Security Coalition, and service with the Department of Health and Human Services (HHS) 405(d) Cybersecurity Task Group, SC Media Advisory Board, and Forbes Technology Council. Lucia has been featured in Harvard Business Review and The Wall Street Journal and is the recipient of the 2023 Cybersecurity Women of the Year Award, 2024 Top Global CISOs by Cyber Defense Magazine, Cyber25 Women of Impact by Team8 and NYSE to name a few. She has a Master of Science in Information and Cybersecurity degree from the University of California, Berkeley. Lucia also holds Master in Business Administration and Juris Doctorate degrees.
Merlin Namuth, ModeratorCISO, City and County of DenverMerlin Namuth is CISO at City and County of Denver. He has worked in cybersecurity for over 26 years. His comprehensive experience spanning several industries includes leading 6 different security programs, creating strategy and building security programs from the ground up, advancing existing security programs, mergers & acquisitions, managing incident response teams, digital forensics, compliance, architecture, and engineering complex security solutions. Namuth has served as an advisor to security startup companies. He has presented at numerous conferences, including RSA Conference 6 times both domestically and internationally, been interviewed on renowned security podcasts, and frequently writes blogs and articles.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes










