Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, September 10, 20259:00 am[PLUS Course] Leveraging Identity & Zero Trust to Protect and Enable the BusinessManaging Director, Profortis Solutions LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmThis live workshop is your steppingstone to gaining a strong understanding of two strategic cybersecurity technologies. In just 6 hours, you will :- Study Identity & Access Management (IAM) & Zero Trust (ZT) – Comprehend the components of IAM & ZT and how they fit into the enterprise security architecture
- Understand the business value of IAM & ZT – Gain practical enterprise insights into how these key technologies can drive security transformation
- Gain a step by step by roadmap for adoption – Understand how to deploy these key technologies along with real word examples
- Foster digital trust – Speak with self-assurance with business, IT & cyber leadership and serve as a trusted adviser to build out a strategic roadmap
What makes this different?
You will gain deep knowledge and rich insights from an eminent industry thought leader via an engaging modular approach.The skills and knowledge you gain will be a great foundation to jump start or accelerate your IAM & ZT journey.Perfect for:- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee will receive the course materials.Warning: This live, in-person intensive has limited seating. Take advantage of this opportunity to learn about transformative cybersecurity technologies that can enable your business and minimize enterprise risk.Your organization’s cybersecurity can’t wait. Register now.9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursvCISO, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, September 11, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)The CISO's Egress Challenge: AI, Shadow IT, and the New Reality of Data SecuritySr. Director of Cybersecurity, Mastronardi ProduceRegistration Level:VIP / Exclusive
8:00 am - 8:45 amAs enterprise data explodes across hybrid, multi-cloud, and on-premises environments, the role of the CISO has shifted from perimeter defense to a deeper understanding of the organization’s data footprint. This private, peer-to-peer roundtable brings together CISOs to discuss their journey with Data Security Posture Management (DSPM), exploring the pivotal shift from what data they have to where that data is going. You will examine how the proliferation of AI tools and the rise of new forms of “shadow IT”—applications and services that bypass official channels—have dramatically increased the reality and risk of unauthorized data egress. Come ready to share and explore practical strategies for discovery, monitoring, and control, offering insights on how to build a security posture that accounts for both known assets and unknown data flows in an age of distributed data.8:00 amCyber Squid Game: Don't Let Your Users Get Eliminated!Director, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:Open Sessions
8:00 am - 8:45 amCyber defenders often feel like Gi-Hun from Squid Game—desperately trying to warn others of the consequences of risky behavior. But fear alone doesn’t change behavior. In this talk, we explore research-backed insights from the National Cybersecurity Alliance’s Oh Behave! report to understand what really motivates users, why security fatigue is real, and how to influence secure behavior through empathy, smart design, and seamless workflows. Learn how to make secure choices the easiest ones—and walk away with practical ways to nudge your users (and leadership) in the right direction.
8:00 amInfraGard Michigan Members Alliance Chapter Meeting and Guest SpeakerArtificial Intelligence: Risks, Opportunities, and Influence on CrimeSupervisory Special Agent, Cyber Task Force, FBI Detroit Field OfficeRegistration Level:Open Sessions
8:00 am - 8:45 amOpen to all attendees. Session details to come.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Securing the Motor City and Beyond: Lessons in Leadership from Top CISOsInformation Security, X; Deputy CISO, X MoneyCISO, City of DetroitCIO, City of DetroitGlobal Information Security Officer, Joyson Safety SystemsRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Detroit and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 23rd edition of SecureWorld Detroit.9:45 amNetworking Break & Cyber ConnectAre You Smarter than a Middle Schooler? A CyberPatriot Challenge – Join this bonus session in the Networking HallSecretary / Treasurer, MCISSE Cyber Patriot ProgramCo-Founder & President, MCISSE Cyber Patriot ProgramRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallCome to the show floor to learn more about the MCISSE CyberPatriot Program, which is part of the national program by the same name. The coalition of colleges, universities, and industry experts is dedicated to showing students a clear pathway from high school to an associate, bachelor, master, or doctoral degree in cybersecurity, earning cybersecurity certifications all along the way. “Our hope is to have enough industry support to cover our expenses and ensure that every school in Michigan can participate in CyberPatriot,” said President Tamara Shoemaker.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsSr. Director, Engineering, Rocket MortgageChief Security Officer, PleasantreesDirector, Cyber Threat Management, Ford Motor CompanyPractice Owner, Harold J. Love & Associates; Captain, Michigan State Police (Ret.)Registration Level:Conference Pass
10:15 am - 10:50 amThis panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.10:15 amThe Global AI Dilemma: How the EU and U.S. Are Balancing Innovation and RegulationCyber Compliance Lead Auditor, Rockwell AutomationRegistration Level:Conference Pass
10:15 am - 10:50 amArtificial Intelligence is impacting our work, and every aspect of our lives, creating both possibilities and challenges. The European Union has enacted broad, mandatory regulations on AI. The United States is focusing on innovation and choosing a different approach by allowing states to decide for themselves. In this session, we explore these two distinct strategies, with a focus on the critical need to balance the protection of human rights and ethical standards, with support for technological advancement.10:15 amTabletop Exercises: The Fun KindRegistration Level:Open Sessions
10:15 am - 10:50 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
10:50 amNetworking Break & Cyber ConnectAsk Me Anything: NIST, AI, and Cyber Careers – Join this bonus session in the Networking HallvCISO, Cyber Risk Opportunities LLCRegistration Level:Open Sessions
10:50 am - 11:10 amLocation / Room: Exhibitor HallPull up a chair with Kip Boyle, longtime CISO, author of Fire Doesn’t Innovate, and host of the Cyber Risk Management Podcast. In this casual, 20-minute conversation, you set the agenda. Bring your questions on NIST CSF, AI, or career growth and walk away with useful insights from Kip and your peers.11:10 amPowerShell to PowerPoint: Transitioning from Practitioner to ManagerSr. Manager, IT Security, BorgWarnerRegistration Level:Conference Pass
11:10 am - 11:45 amThe title is a about a joke I told a team member once: “I learned I was now a manager when my autocomplete filled PowerPoint instead of PowerShell.” This presentation is all about the journey one has to make to transition from a security doer to a security leader, including new responsibilities such as selling security to business leadership, team management, and the drama that comes with being a manager. This won’t be boring manager stuff, as I continue to be a lighthearted techie at heart. I’ve had the honor of managing a global team of extremely talented security engineers and analysts after nearly a decade of growing from an IT guy to a security analyst, engineer, and senior team lead. I present where you need to improve in the soft skills, and where you need to remain technical and analytical. This is a fun journey full of failures, eye opening experiences, and learnings along the way—guaranteed to make you laugh as well as take a note or two!
11:10 amSecuring the Future on Four Wheels: AI, Regulation, and Product Security in Connected VehiclesSr. Cybersecurity Product Analyst, ZF GroupSenior Cybersecurity and Compliance SME, May MobilityRegistration Level:Conference Pass
11:10 am - 11:45 amArtificial intelligence is rapidly transforming vehicles into highly connected, autonomous systems — but with this innovation comes new and complex security challenges. From adversarial AI attacks on perception models to vulnerabilities in vehicle-to-everything (V2X) communications, product security must evolve to keep pace with emerging threats. At the same time, regulators are beginning to establish frameworks that will define how manufacturers design, test, and secure vehicles of the future. This session will explore the intersection of AI, regulation, and product security in autonomous and connected vehicles, providing insights into current risks, evolving compliance requirements, and strategies to build security into products from the ground up.11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceField CTO, Sumo LogicGRC Manager, Little Caesars EnterprisesRegistration Level:Open Sessions
11:10 am - 11:45 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] Bridging the Gap: The Role of the BISO in Modern CybersecurityDirector, Cyber & Information Security, Inteva ProductsBISO, Sr. Manager, Healthcare & Education, Compass Group NAVP, IT & Cybersecurity, Exactuals LLC, City National BankGlobal Cybersecurity Governance, Risk, Compliance and Data Privacy Director, UL SolutionsVP, Information Security & PMO, Penske Automotive GroupRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Building Business Resilience Through Identity-First SecurityCISO, SemperisRegistration Level:VIP / Exclusive
12:00 pm - 12:45 pmRansomware and cybercrime have become top-tier threats to organizations in every industry. Securing endpoints, buying cyber insurance, even paying ransom—none of these options can prevent a business-ending attack. One step that is key to operational and business resilience? A dedicated, identity-first cybersecurity plan.
Join this closed-door, invitation-only, peer-to-peer discussion led by Jim Doggett, CISO at Semperis. Part of his level set explains why the ability to protect and quickly recover your core identity systems—Microsoft Active Directory (AD) and Entra ID, for most enterprise organizations—is vital to successful cyber disaster recovery.
This open forum exchange explores:
- What is the true cost of cybercrime?
- Why do some recommend an AD-specific security strategy?
- If fast AD recovery is important, and then why do so many companies fail to achieve it?
- The next steps to protect your hybrid AD environment
Generously sponsored by:
12:45 pmNetworking Break & Cyber ConnectLevel Up Your Cyber Game: Join this bonus session in the networking lounge of the Networking HallEditorial Director, National Cybersecurity AllianceDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallToday, good cyber skills are good life skills, and we’re here to put your mind through the motions! Join us in the networking lounge of the Exhibitor Hall during the post-lunch keynote break for a turbocharged gameshow and test your abilities! We will engage you with thrilling challenges and strategic quandaries. Come for essential info and practical techniques to safeguard your digital life after the stadium lights have dimmed. This user-focused trivia game demonstrates how utilizing quick wits, tricky quandaries and fast thinking can engage your user audience to move the needle on keeping their digital lives (and your organization’s network) safer.
Along with the 15 or so scored questions, the game show hosts will discuss topics raised in each of the questions. We will also answer audience questions and provide insight on key behaviors. We will utilize a trivia platform that allows the audience to play along and see their score compared to other players in the game.
1:15 pmVERIS: The Missing Link in Your Cyber Risk PlaybookSr. Analyst, InfoSec Governance, Risk & Compliance, AlixPartnersRegistration Level:Conference Pass
1:15 pm - 1:50 pmSecurity risk management and incident response often operate in silos, speaking different “languages” and missing opportunities to learn from each other. This presentation introduces VERIS (Vocabulary for Event Recording and Incident Sharing) as a unifying framework to bridge the gap between risk and security operations. We explore how VERIS’s structured A4 model (Actor, Action, Asset, Attribute) provides a common language for describing threats and incidents, enabling risk analysts to leverage real incident data for more accurate likelihood and impact assessments. Attendees will learn how to map risk scenarios to incident patterns, see examples (including insights from the 2025 Verizon Data Breach Investigations Report) of VERIS in action, and get practical guidance for integrating VERIS into spreadsheets, SIEMs, and GRC platforms.
1:15 pmCan More Policy, Regulation and Security Standards Protect the DoD?Technical Manager, Information Security, NSF InternationalDirector of Information Security, NSF InternationalRegistration Level:Conference Pass
1:15 pm - 1:50 pmFor years organizations have looked for one go to standard. Was it going to be PCI, NIST, ISO, SOC, SOX? Now we have the answer and the winner is CMMC mandated by the Department of Defense for Defense Industrial Base Organizations. CMMC is being mandated to all organizations within the Defense Industrial Base (DIB) with a ramp up plan outlined in 32 CFR and a ecosystem of DIB organizations that will need to meet compliance requirements. The final rule 32 CFR published in 2024 the next rule 48 CFR is only a matter of time. If your organization has work in the DOD space or DIB space are you prepared for CMMC?
1:15 pm[Panel] Vitals of Cybersecurity: CISO Strategies for Securing Healthcare in a Connected WorldCISO, Corewell HealthVP, Information Security & CISO, Trinity HealthCISO, Michigan Medicine at the University of MichiganCISO, University of Michigan Regional Health NetworkRegistration Level:Open Sessions
1:15 pm - 1:50 pmJoin this dynamic panel discussion featuring CISOs from leading Michigan health systems. The session explores the evolving cybersecurity landscape in healthcare, with insights into how top security leaders are navigating threats, protecting patient data, and building resilient infrastructures in an increasingly connected environment.1:50 pmNetworking Break & Cyber ConnectThe Evolution of Social Engineering – Join this bonus session in the Networking HallManaging Director, Profortis Solutions LLCRegistration Level:Open Sessions
1:50 pm - 2:10 pmLocation / Room: Exhibitor HallSME Arun DeSouza will lead a discussion on how phishing, vishing, and smishing are now more targeted and complex, powered by AI to exploit humans, and how we can combat these threats. Join the conversation in the networking lounge of the Exhibitor Hall.
2:10 pmThe Origins of 'Pig Butchering' (Crypto Investment Fraud)Special Agent, Detroit Field Office, FBIRegistration Level:Conference Pass
2:10 pm - 2:45 pmThis presentation explores the fastest growing and emotionally manipulative form of online fraud: cryptocurrency investment fraud, more commonly known as “pig butchering.” This session covers the origins of the highly lucrative scam industry, key features and red flags, investigative challenges, and the FBI’s innovative response to this global threat.
2:10 pmAI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security LeadersSr. Security Engineer, Exeter Finance LLCLead IT Security Engineer, Tyson FoodsRegistration Level:Conference Pass
2:10 pm - 2:45 pmAs quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?2:10 pmISSA Motor City Chapter Meeting (Open to all attendees)Registration Level:Open Sessions
2:10 pm - 2:45 pmCome meet the board of ISSA Motor City, learn about the Information Systems Security Association, and hear from their guest speaker (TBD).
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:Open Sessions
2:45 pm - 3:00 pmLocation / Room: Exhibitor HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityHead of Cybersecurity, Yazaki North & Central America | EMEADirector, Information Security, RoushVice President, Information Technology, Detroit PistonsCISO, BorgWarnerRegistration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.Expect candid insights on topics such as:-
The toughest decisions CISOs face daily
-
Emerging threats and how security leaders are preparing
-
The future of security operations, compliance, and resilience
-
Strategies for bridging the gap between security teams and executive leadership
-
Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.3:45 pmHappy Hour & Dash for PrizesRegistration Level:Open Sessions
3:45 pm - 4:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

- AppOmniBooth: 200
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- Arista NetworksBooth: 360
Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.
- AxoniusBooth: 350
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.
- Cloud Security Alliance DetroitBooth: TBD
- CyeraBooth: 120
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.
- InfraGard MichiganBooth: TBD
The Michigan Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). Members will find access to a number of resources that are used on a day to day basis, and find a number of communication portals to assist in protecting critical infrastructure.
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
- ISC2 Greater DetroitBooth: TBD
ISC2 is consists of over 80,000 members worldwide. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques. The Greater Detroit chapter was been established in 2012 to help bring together local professionals. Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification.
- ISACA DetroitBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Detroit area.
- ISSA Motor CityBooth: TBD
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals. The Motor City chapter is located in the automotive capital of the United States, Detroit, MI. Our chapter is committed to educating, consulting, advising, and overall improving information security for our technology infrastructures.
- Michigan CyberPatriot ProgramBooth: TBD
We provide in-person and online awareness presentations and training sessions across the state. We hold multiple Summer Camps across the state and an annual Awards event celebrating the student’s success. We attend cybersecurity associations recruiting volunteers for the mentoring program and to increase corporate support of this program. Our hope is to have enough industry support to cover our expenses and ensure that every school in Michigan can participate in CyberPatriot.
- MiHCC (Michigan Healthcare Cybersecurity Council)Booth: TBD
Cybersecurity is an expanding field, especially as more organizations go digital. Healthcare has long been a favorite target amongst cybercriminals but has recently been hit even harder. Since its inception in 2017, the MiHCC—a non-profit, public-private partnership—has worked to protect critical healthcare infrastructure and institutions in Michigan by providing free educational workshops for the citizens, patients, workforce, and students of the Healthcare Industry in Michigan.
- Motorola SolutionsBooth: 210
Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration that’s critical for safer communities, safer schools, safer hospitals and safer businesses.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- NexumBooth: 110
Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.
- PonduranceBooth: 250
Pondurance delivers world-class Managed Detection & Response (MDR), Incident Response (IR), Vulnerability Management, and Advisory Services to industries facing today’s most pressing and dynamic cybersecurity challenges. Our U.S. based Security Operations Center (SOC) offers personal, proactive, and around-the-clock cybersecurity to protect the human experience. We take a risk-based approach to cybersecurity; so you know you are protecting your most valuable assets and reducing your cyber risk.
Our mission is to ensure that every organization is able to detect and respond to cyber threats—regardless of size, industry or current in-house capabilities. We believe AI and automation alone aren’t enough, you need ingenious human experience because attackers aren’t machines, they are people. We combine our advanced platform with decades of human intelligence to speed detection and response and contain cybersecurity threats quickly to ultimately decrease risk to your mission.
- Southeast Michigan Chapter of the Association of Certified Fraud Examiners (SEMCACFE)Booth: TBD
The SEMCACFE is one of over 160 local chapters of the Association of Certified Fraud Examiners based in Austin, Texas. The ACFE is the world’s premier provider of anti-fraud training and education. Together with more than 95,000 members, the ACFE is reducing business fraud world-wide and inspiring public confidence in the integrity and objectivity within the profession. This organization is committed to further educating and training qualified individuals in the highly-specialized aspects of detecting, investigating and deterring fraud and white-collar crime.
- SemperisBooth: 240
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- Sumo LogicBooth: 260
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- ThreatLockerBooth: 320
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- U.S. Secret Service – Cyber Fraud Task ForceBooth: TBD
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- WiCyS Michigan AffiliateBooth: TBD
The Michigan WiCyS Affiliate is a part of Women in Cybersecurity (WiCyS), an international organization that connects women in cybersecurity from academia, research, and industry. The affiliate’s mission is to support the WiCyS global goal of advancing, retaining, and recruiting women in cybersecurity. The affiliate also aims to create a community of professional women who share similar passions and missions.
- Arun DeSouza, InstructorManaging Director, Profortis Solutions LLC
Arun DeSouza is a renowned global cybersecurity executive, keynote speaker, and thought leader. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), Artificial Intelligence, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, data security, and privacy.
Arun earned M.S. and PhD degrees from Vanderbilt University. He is a Certified Information Systems Security professional (CISSP) and has earned the Certificate of Cloud Security Knowledge (CCSK). He was induced into the CISO Hall of Fame by the First Global Cyber Observatory and has won multiple industry awards.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Bill Lucas, ModeratorSr. Director of Cybersecurity, Mastronardi Produce
Bill Lucas is a seasoned cybersecurity executive with over 17 years of experience protecting digital assets and sensitive data across the automotive, healthcare, and technology sectors. As head of Information Security, he has led the development and execution of enterprise-wide security strategies that address complex and evolving threats.
Bill’s expertise spans endpoint, application security, cyber defense, secure design, and enterprise risk management. He holds a master’s degree in information assurance with a specialization in Digital Forensics and is a Certified Information Systems Security Professional (CISSP).
A passionate advocate for innovation and knowledge-sharing in cybersecurity, Bill frequently contributes to the professional community through speaking engagements, publications, and mentorship.
- Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity Alliance
Cliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
- Andrew SczygielskiSupervisory Special Agent, Cyber Task Force, FBI Detroit Field Office
- Steven AielloInformation Security, X; Deputy CISO, X Money
Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.
- Andy DoldCISO, City of Detroit
- Art Thompson IIICIO, City of Detroit
In 2021, Mayor Mike Duggan tapped Art Thompson to be the next Chief Information Officer for the City of Detroit, making him the City’s youngest CIO in history at age 34. Thompson has had many great accomplishments since stepping into his current role - including leading the technical security, cybersecurity and technology for the largest NFL draft in history in 2024, as well as successfully maintaining a balanced budget of $61M+ annually for the Department of Innovation and Technology (DoIT).
Prior to becoming CIO, Thompson served as the Director of Public Safety and Cyber Security for DoIT, where he led the implementation of the City’s first police body camera program. He has over sixteen years of technical experience in IT management and operations. He is a graduate of Eastern Michigan University with a degree in Supply Chain Management and holds a Certificate in Cybersecurity from Harvard University.
- Maria Haight, ModeratorGlobal Information Security Officer, Joyson Safety Systems
Maria Haight is a seasoned technology executive with extensive expertise in cybersecurity, IT transformation, talent development, and vendor management, having served as both a Chief Information Officer (CIO) and Chief Information Security Officer (CISO). She currently serves as the Global Information Security Officer at Joyson Safety Systems.
Her expertise encompasses driving organizational change across various domains, including cloud and digital enablement, enterprise applications and platform integration, cybersecurity, data rationalization, automation, process enhancement, and workforce optimization.
Her diverse experience crosses various industries including: telecommunications (Nortel), consumer packaged goods (Kellogg), finance (KCCU & Zeal Credit Union), and print manufacturing (TGI Direct).
- Donna DavisSecretary / Treasurer, MCISSE Cyber Patriot Program
Donna Davis has more than 30 years of experience across various public sector disciplines including cybersecurity, environmental protection, grant and project administration, emergency management planning, housing, and economic development. In 2023, Donna joined Michigan CyberPatriot and currently serves in a leadership capacity as the organization’s Secretary/Treasurer and as a strategic outreach/planner for young adult career development. The Michigan CyberPatriot Program is a non-profit program that works to encourage middle and high school students to explore and enter Michigan-based careers in cybersecurity. Building on her decade-long cybersecurity career with the State of Michigan, Donna most recently was the Chief of Staff to the Chief Security and Chief Information Officer, helping to implement statewide cybersecurity strategies to protect public information systems and state of Michigan residents. Prior to her role as Chief of Staff, Donna served as the first Privacy and Information Security Officer for the Michigan Department of Natural Resources (DNR) where she developed the department’s first formal cybersecurity program that balanced privacy, actionable and non-actionable risk and data security compliance with the public sector requirement for right/need-to-know. Donna is a huge fan of the “green and white” and a supporter of her two alma maters: Michigan State and Eastern Michigan Universities.
- Tamara Shoemaker, HostCo-Founder & President, MCISSE Cyber Patriot Program
Tamara's primary mission is to address the shortage of specifically educated and trained cybersecurity professionals. The funding she has obtained from the State of Michigan has allowed her to develop the Michigan CyberPatriot program. CyberPatriot provides a structured educational experience for well over 1,000 high school and middle school students, and cybersecurity teaching materials for Michigan’s K-12 educators. In that respect, she has facilitated the Center’s unique engagement in cybersecurity teaching at the middle and high school levels, primarily through innovative cybersecurity summer camps. In conjunction with this program, she created a digital badging system to further motivate and distinguish Michigan CyberPatriot participation, which is the first of its kind in the nation. Finally, she and her husband, Dan Shoemaker, published a groundbreaking book for secondary school teachers entitled “Teaching Cybersecurity” with CRC Press, which can be purchased on Amazon.
- Leah ForemanSr. Director, Engineering, Rocket Mortgage
Leah Foreman is a cybersecurity leader with more than 17 years of experience leading IT Risk, IT Compliance, Identity Engineering and Access Management, Asset Management, Security Awareness, Application Security, Cloud Security and Program Management functions. Currently she serves as a Senior Director of Security Engineering at Rocket Mortgage in Detroit where she leads cross functional enterprise security projects and engineering excellence initiatives with a mission of making the securest thing the easiest thing. Leah previously held roles at Google and KPMG, and maintains her CISSP.
- Eric MackChief Security Officer, Pleasantrees
Eric Mack is an internationally recognized expert in operations, health & safety, and external affairs, with over two decades of cross-industry impact. A Licensed Fraud Investigator and Certified Emergency Manager for more than 20 years, Eric has advised leading organizations across healthcare, government, and the private sector on risk mitigation, regulatory compliance, and organizational resilience.
Renowned for his strategic leadership in safety, security, and emergency preparedness, Eric has played a pivotal role in building high-performing systems that prioritize both regulatory integrity and human well-being. He is widely respected as a trusted advisor and operator at the intersection of crisis management and business continuity.
- Stephanie ScheuermannDirector, Cyber Threat Management, Ford Motor Company
Stephanie Scheuermann is the Director of Cyber Threat Management at Ford Motor Company, where she heads Data Protection Services. Her journey at Ford began in 1996, and after various roles within Ford Credit, she made a significant shift in 2004 to focus exclusively on cybersecurity. Since then, under her leadership, Stephanie has been instrumental in establishing a robust global Cyber Defense team, enhancing Ford's capabilities in Incident Response, Electronic Discovery & Digital Forensics, and Threat Intelligence. Acknowledged as a Technical Leader in Cyber Threat Intelligence in 2018, her academic credentials include a BS in Management Information Systems from Cleary University, an MS in Information Assurance from Walsh College, and has been CISSP certified since 2004. Stephanie has recently pioneered the Ford Women in Cyber Security community, securing a Tier 1 Partnership with WiCyS to promote women's involvement in cybersecurity.
- Harold J. Love, ModeratorPractice Owner, Harold J. Love & Associates; Captain, Michigan State Police (Ret.)
- Enida MetajCyber Compliance Lead Auditor, Rockwell Automation
Enida Metaj is an award-winning cybersecurity leader with more than 14 years of experience across cybersecurity, IT, and finance. She currently serves as Cyber Compliance Lead Auditor for Rockwell Automation, a Fortune 500 company operating within the nation’s critical infrastructure. She was named a “40 Under 40” award recipient by Oakland County Government, in recognition of her exceptional leadership, innovation, and community service, highlighting her contributions to driving positive change locally and beyond.
Enida holds a Bachelor of Laws degree and a master’s in public administration, combining legal and policy expertise with technical acumen. She has further specialized in cybersecurity through a master’s certificate in Enterprise Cybersecurity Leadership, a Certificate in Exercising Leadership from HarvardX, and professional certifications in ISO standards and artificial intelligence. Certified Information Security Manager (CISM), demonstrating expertise in information security governance, risk management, and incident response.
A respected thought leader, she has served as a judge for high-impact industry events including the 2024 SC Media Cybersecurity Awards and the CyberShark Pitch Competition, recognizing excellence and innovation across the cybersecurity landscape. Beyond her professional achievements, she is deeply committed to giving back—volunteering as a mentor to women in cybersecurity and actively empowering the next generation of leaders. As the Employment Director for ISSA Motor City, she leads initiatives focused on job placement within the information security community, building strong partnerships with employers to create sustainable employment pathways for members. Through strategic planning and hands-on support, she aligns candidates with opportunities that fit their skills, career goals, and long-term growth potential.
This dedication is further reflected in her role as a NICE | NIST Cybersecurity Career Ambassador, helping to advance national efforts in cybersecurity education, training, and workforce development.
- Kip Boyle, ModeratorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Ryan MostillerSr. Manager, IT Security, BorgWarner
Ryan Mostiller is a security leader in the Metro Detroit community, currently serving as the Security Operations Manager for BorgWarner. After more than a decade in both technical and management roles in security, Ryan enjoys any opportunity to engage with fellow practitioners and share learnings. Ryan has worked across various industries and within several Fortune 500 companies, most recently in the automotive industry.
Ryan has a Masters in IT Management from Oakland University and bachelors in Information Technology, along with security certifications from GIAC. You may have seen other presentations that Ryan has created and presented at, including SecureWorld, GrrCON, ISC2, and Evanta. Ryan has also developed and teaches an OU Executive MBA course at Oakland University titled "Cybersecurity for Executives."
- Tyson BensonSr. Cybersecurity Product Analyst, ZF Group
- Hemanth TadepalliSenior Cybersecurity and Compliance SME, May Mobility
Hemanth Tadepalli serves as the Senior Cybersecurity & Compliance Subject Matter Expert (SME) at May Mobility, a company revolutionizing transportation through advanced autonomous vehicle technology. His career spans notable roles at prestigious organizations, including management consulting firm AlixPartners, cybersecurity leader Mandiant, tech giant Google, and Michigan-based cybersecurity startup SensCy.
Hemanth’s research focuses on advancing cybersecurity in critical areas such as autonomous vehicle security, Internet of Things (IoT) security, threat intelligence, risk management, API security, and election security. He was appointed by Michigan Secretary of State Jocelyn Benson to the Advisory Task Force overseeing statewide election security and integrity.
In addition to his technical contributions, Hemanth has published numerous articles on cybersecurity and emerging technologies, showcasing his thought leadership. He is a sought-after speaker, invited to present at prominent cybersecurity conferences, serve as a distinguished panelist, and share insights on technology-focused podcasts. His impactful work has earned him accolades, including the 40 Under 40 recognition from Oakland County, Michigan, and the Governor’s Service Award for his philanthropic efforts and community service in cybersecurity.
Hemanth earned his bachelor’s degree in Computer Science from Kettering University, concentrating in cybersecurity and minoring in Pre-Law, Innovation, and Entrepreneurship. He went on to earn his master’s degree in Cybersecurity and Information from the University of California, Berkeley, where he was honored as the student commencement speaker. He is currently a Ph.D. candidate at Dakota State University, specializing in cyber defense. In addition to his academic pursuits, Hemanth serves in elected office for the City of Troy and sits on the Board of Directors for Kettering University.
- Panel Discussion
- Chas ClawsonField CTO, Sumo Logic
As a technologist interested in disruptive cloud technologies, Chas joined Sumo Logic's Cyber Security team with over 20 years in the field, consulting with many federal agencies on how to secure modern workloads. In the federal space, he spent time as an architect designing the Department of Commerce ESOC SIEM solution. He also worked at the NSA as a civilian conducting Red Team assessments and within the Office of Compliance and Policy. Commercially, he has worked with MSSP practices and security consulting services for various Fortune 500 companies. Chas also enjoys teaching networking and cybersecurity courses as a Professor at the University of Maryland Global Campus
- Denise Browning, ModeratorGRC Manager, Little Caesars Enterprises
Denise Browning is a Governance, Risk, and Compliance Manager with Little Caesars Enterprises. She is a seasoned IT professional with more than 20 years in Information Security in healthcare, automotive, retail, and hospitality industries. She is active with multiple professional organizations, including the Michigan Council of Women in Technology, ISACA, ISSA, WiCyS, and InfraGard. She has worked as an adjunct instructor at Monroe County Community College.
- Ahmeed AhmeedDirector, Cyber & Information Security, Inteva Products
Ahmeed is the Director of Cyber and Information Security at Inteva Products, a global Tier-I automotive supplier. In his role, he oversees three key areas: Cyber Defense, Information Security, and Data Privacy (with a particular focus on privacy requirements for the company’s EU entities). His strategic oversight and leadership ensures the organization’s cybersecurity program alignment with the business.
With over 20 years of experience across various sectors such as telecommunications, education, and manufacturing, Ahmeed brings a wealth of knowledge to his position. He holds a bachelor’s degree in Computer and Control Engineering and an MBA from Central Michigan University, along with several professional certifications.
- Morgan FleckBISO, Sr. Manager, Healthcare & Education, Compass Group NA
Morgan Fleck is a Senior Manager in the Compass Group Business Information Security Office (BISO), where she leads cybersecurity initiatives across the healthcare and education sectors. With a foundation in healthcare, Morgan brings a unique perspective to cybersecurity—one that bridges patient care, regulatory compliance, and digital risk management.
With over 20 years of experience, Morgan started her career in healthcare, gaining knowledge of operational and privacy challenges faced by clinical teams. She now utilizes this understanding to assist organizations in managing cybersecurity and compliance complexities, turning technical requirements into practical strategies aligned with business needs.
Morgan focuses on connecting technical and non-technical stakeholders to ensure cybersecurity is viewed as a strategic advantage. Recognized for her leadership and comprehension of healthcare workflows, she collaborates with cross-functional teams to optimize governance, risk, and compliance (GRC) processes and implement scalable solutions that balance innovation and security. - Amir JabriVP, IT & Cybersecurity, Exactuals LLC, City National Bank
- Nicole RembertGlobal Cybersecurity Governance, Risk, Compliance and Data Privacy Director, UL Solutions
Nicole Rembert is an experienced transformational leader with multiple years of experience in information technology and cybersecurity. Over the course of Nicole’s career, she has developed an exceptional business acumen within healthcare and financial organizations. Nicole recently joined UL Solutions as the Global Cybersecurity Governance, Risk, Compliance and Data Privacy Director.
Prior to joining UL Solutions, she led multiple large cybersecurity initiatives at Blue Cross Blue Shield Michigan as the Director, Security Programs, Governance and Compliance. She has extensive experience in areas such as creating effective strategies, budget management, program oversight, compliance and risk management.
Nicole Rembert holds a Bachelor of Science degree from Western Michigan University, a Master of Science in Information Technology from Lawrence Technological University, maintains three highly-accredited certifications: Project Manager Practitioner (PMP), Certified ScrumMaster (CSM) and HITRUST Certified CSF Practitioner (CCSFP), and is pursuing a Certified Information Security Manager (CISM) certification. She is a member of several organizations, including the Information Technology Senior Management Forum (ITSMF) and Alpha Kappa Alpha Sorority, Incorporated.
Nicole believes in the importance of mentoring and giving back. She served as a mentor for young women for multiple organizations and currently mentors women interested in technology and cybersecurity.
- Mo Wehbi, ModeratorVP, Information Security & PMO, Penske Automotive Group
As the VP of Information Security & PMO within the IT department at Penske Automotive Group, Mo oversees the implementation and governance of cybersecurity and IT service management best practices across the organization. He has over 18 years of experience in leading and managing complex IT projects, portfolios, and programs, as well as ensuring compliance, data security, and risk management for multiple business units and stakeholders.
He is also an active board member and speaker at various professional associations and forums, such as ISACA, Cloud Security Alliance, and Cybersecurity Collaboration Forum, where he shares his insights and expertise on emerging trends and challenges in the cybersecurity and IT services. His specialties include Risk Management, Information Security Management, Compliance, Data Security, Project Management, Portfolio Management, Program Management, Mergers, Acquisitions and Divestitures, Organization Management, Change Management, and IT Management.
- Jim Doggett, ModeratorCISO, Semperis
James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
- Barry EitelEditorial Director, National Cybersecurity Alliance
Barry crafts resources and news reports for the general public and cybersecurity specialists. He has written about technology, finance and small business for Insure.com, Policygenius, and Lendio. He was the Silicon Valley Correspondent for Turkey’s Anadolu Agency. He is also a playwright and screenwriter, and several of his plays have been produced around the country. He received his MFA in Dramatic Writing from NYU Tisch.
- Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity Alliance
Cliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
- Peter ShamoonSr. Analyst, InfoSec Governance, Risk & Compliance, AlixPartners
Peter Shamoon serves as the Security Risk Management Senior Analyst at AlixPartners, where he architects and oversees the firm’s security-risk program—from enterprise-wide threat identification and assessment to ongoing control validation and executive-level reporting. Drawing years of experience in risk evaluation, framework governance, and control assurance, he translates complex cyber threats into clear, business-driven actions.
Peter holds both a bachelor’s and a master’s degree in Cybersecurity & Information Assurance from the University of Detroit Mercy. He is also credentialed as a Certified in Risk and Information Systems Control (CRISC) professional and is Open FAIR certified.
- Rhia DancelTechnical Manager, Information Security, NSF International
As Technical Manager, Information Security, at NSF, Rhia Dancel supports clients with risk management within the information security landscape to achieve effective security objectives and goals. Dancel is an Lead CCA, ISO/IEC 27001, 20000-1 and 9001 Lead Auditor for NSF and is the Technical Lead for Cybersecurity Maturity Model Certification program (CMMC).
Dancel has worked at NSF for over a decade. She previously held several auditing and technical positions in the information security and pharma quality sectors. She has completed technical writing work and audits for NSF throughout North America, working directly with customers on-site and remotely developing security control matrices. She has developed and built a risk-based platform that supports industry best practices for treating and mitigating risk and worked with multiple academic leaders on information security and awareness.
- Tony GilesDirector of Information Security, NSF International
As Director of Information Security, at NSF, Tony Giles leads the teams that audit and certify organization’s information security systems. Giles is an ISO/IEC 27001, ISO/IEC 20000-1 and ISO 9001 Lead Auditor and is involved with the Cybersecurity Maturity Model Certification program (CMMC). Giles has spent nearly two decades of his career with NSF, having previously served as Director of Custom Audit Programs, Director of Operations, Director of Business Development and Service Delivery Manager. He has conducted audits globally for over 10 years and worked on large-scale security implementation projects, including NIST 800-171, NIST 800-88, ISO/IEC 27001, ISO 28000 and other custom security standards. He has also conducted audits for DoD suppliers and private sector organizations, implementing security assessment programs focused on multiple security controls, cryptographic erasure and other custom security programs.
- Scott D. DresenCISO, Corewell Health
Scott D. Dresen, MBA, FACHE, FHIMSS, CISSP, CISM is the chief information security officer of Corewell Health. As the CISO, Scott is accountable as the strategic leader responsible for implementing and operating the enterprise information security program across all Corewell Health divisions, and shares responsibility for leading the enterprise business assurance program including emergency management, business continuity, and operational readiness. Prior to his current Corewell Health role, Scott served as Senior Vice President & CTO/CISO for Spectrum Health where he was accountable for enterprise infrastructure, cloud services, and enterprise security. Before joining Spectrum Health in 2007, Scott served as chief information officer for the Wayne State University Physician Group, where he was responsible for the strategic growth and development of information technology services and capabilities supporting the Wayne State University School of Medicine and its multi-specialty group practice. Scott has significant experience delivering innovative information technology solutions in academic, for-profit, and not-for-profit health care systems. Combining strong business acumen with passions for both technology and security, he strives to enable business value realization by leveraging risk informed decision making to deliver secure digital services and capabilities.
- Preston JenningsVP, Information Security & CISO, Trinity Health
Preston is a well-rounded security executive with over 30 years of experience dealing with information risk and security related issues impacting Fortune 500 companies. He has in depth experience addressing the complex business and compliance related problems faced by businesses today.
Preston is responsible for a wide range of activities including executive communication, strategy development, budget management, staffing acquisition and retention, and sponsorship of enterprise-wide initiatives. He has built programs that addresses all facets of the information risk and security, including: Creation of state of the art Cyber Fusion Centers; Redefinition of the endpoint and server security model; Governance of information security policies and controls; Implementation of security programs that support analysis, investigation and remediation of security threats; Management of information vendor security compliance program; Ownership of a broad range of risk and security compliance related activities (Internal Audit, Internal Controls over Financial Reporting, etc.); and Specialties: Information Security, Cyber Security, Privacy, Compliance, Identity Management.
- Jack KufahlCISO, Michigan Medicine at the University of Michigan
Jack Kufahl serves as the Chief Information Security Officer for Michigan Medicine at the University of Michigan. With over 20 years in information technology leadership, he is a founding officer of the Michigan Healthcare Cybersecurity Council (MiHCC), a public-private partnership supporting Michigan’s healthcare sector. Jack is a graduate of the FBI CISO Academy and the U.S. Army War College National Security Seminar. He also holds a Master of Legal Studies with a concentration in compliance law from Washington University in St. Louis.
In addition to his role at Michigan Medicine, Jack advises several startups and entrepreneurial ventures, offering expertise in information security, privacy, and digital risk. His work supports the safety and resilience of healthcare systems, benefiting Michigan’s citizens, patients, workforce, and students.
- Greg SiegCISO, University of Michigan Regional Health Network
Greg Sieg is the Chief Information Security Officer (CISO) for the University of Michigan Regional Health Network, where he leads the Information Assurance department for the University of Michigan Health-West and University of Michigan Health-Sparrow. With more than 16 years of experience in Information Systems, Cybersecurity, Governance, and Critical Infrastructure, Greg brings a wealth of expertise to the healthcare sector. In addition to his professional role, Greg serves as the president and chairman of the Michigan Healthcare Cybersecurity Council (MiHCC), a non-profit dedicated to improving the cybersecurity posture of healthcare organizations across the state of Michigan.
- Arun DeSouza, ModeratorManaging Director, Profortis Solutions LLC
Arun DeSouza is a renowned global cybersecurity executive, keynote speaker, and thought leader. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), Artificial Intelligence, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, data security, and privacy.
Arun earned M.S. and PhD degrees from Vanderbilt University. He is a Certified Information Systems Security professional (CISSP) and has earned the Certificate of Cloud Security Knowledge (CCSK). He was induced into the CISO Hall of Fame by the First Global Cyber Observatory and has won multiple industry awards.
- Julia MacBethSpecial Agent, Detroit Field Office, FBI
Julia MacBeth is a Special Agent with the Federal Bureau of Investigation (FBI) assigned to the Detroit Field Office where she leads the Detroit Financial Crimes and Fraud Task Force (DFFACT) and coordinates a national scam victim notification initiative. Formerly, Special Agent MacBeth was assigned to the Cyber Enabled Fraud and Money Laundering Unit located at FBI headquarters, where she was the FBI’s Elder Justice Coordinator and Cyber Enabled Frauds Program Manager, helping to create investigative strategy to mitigate the threat of international scam organizations.
- Ankit GuptaSr. Security Engineer, Exeter Finance LLC
Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.
- Shilpi MittalLead IT Security Engineer, Tyson Foods
Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.
Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.
Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.
- ISSA Representative
- Janette BarrettoHead of Cybersecurity, Yazaki North & Central America | EMEA
As a cybersecurity leader, Janette drives global cybersecurity and information security programs, ensuring enterprise-wide protection and compliance with evolving regulations. Her curiosity fuels her passion for learning and staying ahead in the field.
Collaboration is key to success, whether working with C-suite executives, peers, or cross-functional teams to drive major security initiatives.
- Rajesh NanwaniDirector, Information Security, Roush
Rajesh is a seasoned cybersecurity leader who has built and led global cybersecurity programs with a strong focus on protecting critical assets and ensuring compliance with frameworks such as CMMC, NIST, SOC 2, and ISO 27K.
He holds multiple industry-recognized certifications and is dedicated to advancing enterprise security posture through continuous improvement and proactive defense against evolving cyber threats. - Paul RapierVice President, Information Technology, Detroit Pistons
Paul Rapier, Vice President of IT for the Detroit Pistons, is a seasoned technology leader with 25 years of IT experience, including a decade in management. Known for his expertise in driving innovation within the sports industry, Paul actively shares his knowledge as a sought-after speaker at cybersecurity conferences and contributes to technology-driven initiatives in professional sports. He also serves on the Advisory Council for SecureWorld Detroit, where he helps shape cybersecurity standards and practices. His diverse skill set enables him to craft IT strategies that enhance efficiency and competitiveness.
- Juman Doleh-Alomary, ModeratorCISO, BorgWarner
Juman Doleh-Alomary is BorgWarner's Chief Information Security Officer and an active volunteer board member of the ISACA Detroit Chapter. With over 15 years of experience in security, audit, investigation, compliance, and privacy policy/standards,
Juman most recently held the position of Director of Cybersecurity GRC at Little Caesar's Enterprises serving the Ilitch holdings portfolio of companies. Her prior positions include Director of IT Audit at Wayne State University and a significant tenure in IT and Risk Management at Ford Motor Company.
A leader within the ISACA community, Juman has held various roles, including past president and, notably, chair of the IIA/ISACA Spring Conference, which achieved a record attendance. She is active volunteer with Michigan Council of Women in Technology (MCWT), Women Security Alliance (WomSA), and on the advisory board of Women in Cyber (WiCyS) Michigan.
An alumnus of the University of Michigan, she holds both a bachelor’s and a master’s degree, complemented by an impressive suite of certifications: CISA, CISM, CRISC, CDPSE, and ISO 27001.
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
