googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 10, 2025
    9:00 am
    [PLUS Course] Leveraging Identity & Zero Trust to Protect and Enable the Business
    • session level icon
    speaker photo
    Managing Director, Profortis Solutions LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Course description and details to come.

    9:00 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Thursday, September 11, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Cyber Squid Game: Don't Let Your Users Get Eliminated!
    • session level icon
    speaker photo
    Director, Information Security & Engagement, National Cybersecurity Alliance
    Registration Level:
    • session level iconConference Pass
    8:00 am - 8:45 am

    Cyber defenders often feel like Gi-Hun from Squid Game—desperately trying to warn others of the consequences of risky behavior. But fear alone doesn’t change behavior. In this talk, we explore research-backed insights from the National Cybersecurity Alliance’s Oh Behave! report to understand what really motivates users, why security fatigue is real, and how to influence secure behavior through empathy, smart design, and seamless workflows. Learn how to make secure choices the easiest ones—and walk away with practical ways to nudge your users (and leadership) in the right direction.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Securing the Motor City and Beyond: Lessons in Leadership from Top CISOs
    • session level icon
    speaker photo
    Information Security, X; Deputy CISO, X Money
    speaker photo
    CIO, City of Detroit
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    The role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Detroit and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.
    This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 23rd edition of SecureWorld Detroit.
    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:15 am
    [Panel] Bridging the Gap: The Role of the BISO in Modern Cybersecurity
    • session level icon
    speaker photo
    Director, Cyber & Information Security, Inteva Products
    speaker photo
    BISO, Sr. Manager, Healthcare & Education, Compass Group NA
    speaker photo
    VP, Information Security & PMO, Penske Automotive Group
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    As cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.
    In this engaging panel discussion, regional BISOs  share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.

    Attendees will gain:

    Join us to explore the intersection of business and security and how mastering both can accelerate your career.
    10:15 am
    Investing in Your Application Security Programs
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Session description to come.

    10:15 am
    Tabletop Exercises: The Fun Kind
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Tabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!

    This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Exhibitor Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    PowerShell to PowerPoint: Transitioning from Practitioner to Manager
    • session level icon
    speaker photo
    Sr. Manager, IT Security, BorgWarner
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    The title is a about a joke I told a team member once: “I learned I was now a manager when my autocomplete filled PowerPoint instead of PowerShell.” This presentation is all about the journey one has to make to transition from a security doer to a security leader, including new responsibilities such as selling security to business leadership, team management, and the drama that comes with being a manager. This won’t be boring manager stuff, as I continue to be a lighthearted techie at heart. I’ve had the honor of managing a global team of extremely talented security engineers and analysts after nearly a decade of growing from an IT guy to a security analyst, engineer, and senior team lead. I present where you need to improve in the soft skills, and where you need to remain technical and analytical. This is a fun journey full of failures, eye opening experiences, and learnings along the way—guaranteed to make you laugh as well as take a note or two!

    11:10 am
    Cyber Risk by the Numbers from a Cyber Insurance Perspective
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    You’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    GRC Manager, Little Caesars Enterprises
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] A Leadership Strategy for Navigating a Crisis
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session description to come.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Generously sponsored by:

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Level Up Your Cyber Game: Join this bonus session in the networking lounge of the Exhibitor Hall
    speaker photo
    Editorial Director, National Cybersecurity Alliance
    speaker photo
    Director, Information Security & Engagement, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Today, good cyber skills are good life skills, and we’re here to put your mind through the motions! Join us in the networking lounge of the Exhibitor Hall during the post-lunch keynote break for a turbocharged gameshow and test your abilities! We will engage you with thrilling challenges and strategic quandaries. Come for essential info and practical techniques to safeguard your digital life after the stadium lights have dimmed. This user-focused trivia game demonstrates how utilizing quick wits, tricky quandaries and fast thinking can engage your user audience to move the needle on keeping their digital lives (and your organization’s network) safer.

    Along with the 15 or so scored questions, the game show hosts will discuss topics raised in each of the questions. We will also answer audience questions and provide insight on key behaviors. We will utilize a trivia platform that allows the audience to play along and see their score compared to other players in the game.

    1:15 pm
    VERIS: The Missing Link in Your Cyber Risk Playbook
    • session level icon
    speaker photo
    Sr. Analyst, InfoSec Governance, Risk & Compliance, AlixPartners
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Security risk management and incident response often operate in silos, speaking different “languages” and missing opportunities to learn from each other. This presentation introduces VERIS (Vocabulary for Event Recording and Incident Sharing) as a unifying framework to bridge the gap between risk and security operations. We explore how VERIS’s structured A4 model (Actor, Action, Asset, Attribute) provides a common language for describing threats and incidents, enabling risk analysts to leverage real incident data for more accurate likelihood and impact assessments. Attendees will learn how to map risk scenarios to incident patterns, see examples (including insights from the 2025 Verizon Data Breach Investigations Report) of VERIS in action, and get practical guidance for integrating VERIS into spreadsheets, SIEMs, and GRC platforms.

    1:15 pm
    Can More Policy, Regulation and Security Standards Protect the DoD?
    • session level icon
    speaker photo
    Technical Manager, Information Security, NSF International
    speaker photo
    Director of Information Security, NSF International
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    For years organizations have looked for one go to standard. Was it going to be PCI, NIST, ISO, SOC, SOX? Now we have the answer and the winner is CMMC mandated by the Department of Defense for Defense Industrial Base Organizations. CMMC is being mandated to all organizations within the Defense Industrial Base (DIB) with a ramp up plan outlined in 32 CFR and a ecosystem of DIB organizations that will need to meet compliance requirements. The final rule 32 CFR published in 2024 the next rule 48 CFR is only a matter of time. If your organization has work in the DOD space or DIB space are you prepared for CMMC?

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Cyber Third-Party Risk Manager, AbbVie
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us at the lounge in the Exhibitor Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    2:10 pm
    AI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security Leaders
    • session level icon
    speaker photo
    Sr. Security Engineer, Exeter Finance LLC
    speaker photo
    Lead IT Security Engineer, Tyson Foods
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    As quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.
    In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.
    Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?
    2:10 pm
    [Panel] Proactive Security: Building Digital Fortresses Against Modern Dragons
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.

    This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.

    Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Exhibitor Hall

    This is your final chance to visit the Exhibitor Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    speaker photo
    Head of Cybersecurity, Yazaki North & Central America | EMEA
    speaker photo
    Director, Information Security, Roush
    speaker photo
    Vice President, Information Technology, Detroit Pistons
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater
    Ever wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.
    Expect candid insights on topics such as:
    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners
    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.
    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • AppOmni
    Booth: 200

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Arista Networks
    Booth: 360

    Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.

  • Axonius
    Booth: 350

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Cloud Security Alliance (CSA)
    Booth: TBD

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • InfraGard Michigan
    Booth: TBD

    The Michigan Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). Members will find access to a number of resources that are used on a day to day basis, and find a number of communication portals to assist in protecting critical infrastructure.

    InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.

  • ISC2 Greater Detroit
    Booth: TBD

    ISC2 is consists of over 80,000 members worldwide. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques. The Greater Detroit chapter was been established in 2012 to help bring together local professionals. Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification.

  • ISACA Detroit
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Detroit area.

  • ISSA Motor City
    Booth: TBD

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals. The Motor City chapter is located in the automotive capital of the United States, Detroit, MI. Our chapter is committed to educating, consulting, advising, and overall improving information security for our technology infrastructures.

  • Michigan CyberPatriot Program
    Booth: TBD

    We provide in-person and online awareness presentations and training sessions across the state. We hold multiple Summer Camps across the state and an annual Awards event celebrating the student’s success. We attend cybersecurity associations recruiting volunteers for the mentoring program and to increase corporate support of this program. Our hope is to have enough industry support to cover our expenses and ensure that every school in Michigan can participate in CyberPatriot.

  • MiHCC (Michigan Healthcare Cybersecurity Council)
    Booth: TBD

    Cybersecurity is an expanding field, especially as more organizations go digital. Healthcare has long been a favorite target amongst cybercriminals but has recently been hit even harder. Since its inception in 2017, the MiHCC—a non-profit, public-private partnership—has worked to protect critical healthcare infrastructure and institutions in Michigan by providing free educational workshops for the citizens, patients, workforce, and students of the Healthcare Industry in Michigan.

  • Motorola Solutions
    Booth: 210

    Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration that’s critical for safer communities, safer schools, safer hospitals and safer businesses.

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Nexum
    Booth: 110

    Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.

  • Semperis
    Booth: 240

    For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.

    As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) ConferenceHIP Podcast and free identity security tools Purple Knight and Forest Druid.

  • Sumo Logic
    Booth: 260

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • ThreatLocker
    Booth: 320

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS Michigan Affiliate
    Booth: TBD

    The Michigan WiCyS Affiliate is a part of Women in Cybersecurity (WiCyS), an international organization that connects women in cybersecurity from academia, research, and industry. The affiliate’s mission is to support the WiCyS global goal of advancing, retaining, and recruiting women in cybersecurity. The affiliate also aims to create a community of professional women who share similar passions and missions.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Arun DeSouza, Instructor
    Managing Director, Profortis Solutions LLC

    Arun DeSouza is a renowned global cybersecurity executive, keynote speaker, and thought leader. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), Artificial Intelligence, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, data security, and privacy.

    Arun earned M.S. and PhD degrees from Vanderbilt University. He is a Certified Information Systems Security professional (CISSP) and has earned the Certificate of Cloud Security Knowledge (CCSK). He was induced into the CISO Hall of Fame by the First Global Cyber Observatory and has won multiple industry awards.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Cliff Steinhauer
    Director, Information Security & Engagement, National Cybersecurity Alliance

    Cliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.​

  • speaker photo
    Steven Aiello
    Information Security, X; Deputy CISO, X Money

    Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.

  • speaker photo
    Art Thompson III
    CIO, City of Detroit

    In 2021, Mayor Mike Duggan tapped Art Thompson to be the next Chief Information Officer for the City of Detroit, making him the City’s youngest CIO in history at age 34. Thompson has had many great accomplishments since stepping into his current role - including leading the technical security, cybersecurity and technology for the largest NFL draft in history in 2024, as well as successfully maintaining a balanced budget of $61M+ annually for the Department of Innovation and Technology (DoIT).

    Prior to becoming CIO, Thompson served as the Director of Public Safety and Cyber Security for DoIT, where he led the implementation of the City’s first police body camera program. He has over sixteen years of technical experience in IT management and operations. He is a graduate of Eastern Michigan University with a degree in Supply Chain Management and holds a Certificate in Cybersecurity from Harvard University.

  • speaker photo
    Panel Discussion
  • speaker photo
    Ahmeed Ahmeed
    Director, Cyber & Information Security, Inteva Products

    Ahmeed is the Director of Cyber and Information Security at Inteva Products, a global Tier-I automotive supplier. In his role, he oversees three key areas: Cyber Defense, Information Security, and Data Privacy (with a particular focus on privacy requirements for the company’s EU entities). His strategic oversight and leadership ensures the organization’s cybersecurity program alignment with the business.

    With over 20 years of experience across various sectors such as telecommunications, education, and manufacturing, Ahmeed brings a wealth of knowledge to his position. He holds a bachelor’s degree in Computer and Control Engineering and an MBA from Central Michigan University, along with several professional certifications.

  • speaker photo
    Morgan Fleck
    BISO, Sr. Manager, Healthcare & Education, Compass Group NA

    Morgan Fleck is a Senior Manager in the Compass Group Business Information Security Office (BISO), where she leads cybersecurity initiatives across the healthcare and education sectors. With a foundation in healthcare, Morgan brings a unique perspective to cybersecurity—one that bridges patient care, regulatory compliance, and digital risk management.

    With over 20 years of experience, Morgan started her career in healthcare, gaining knowledge of operational and privacy challenges faced by clinical teams. She now utilizes this understanding to assist organizations in managing cybersecurity and compliance complexities, turning technical requirements into practical strategies aligned with business needs.
    Morgan focuses on connecting technical and non-technical stakeholders to ensure cybersecurity is viewed as a strategic advantage. Recognized for her leadership and comprehension of healthcare workflows, she collaborates with cross-functional teams to optimize governance, risk, and compliance (GRC) processes and implement scalable solutions that balance innovation and security.

  • speaker photo
    Mo Wehbi
    VP, Information Security & PMO, Penske Automotive Group

    As the VP of Information Security & PMO within the IT department at Penske Automotive Group, Mo oversees the implementation and governance of cybersecurity and IT service management best practices across the organization. He has over 18 years of experience in leading and managing complex IT projects, portfolios, and programs, as well as ensuring compliance, data security, and risk management for multiple business units and stakeholders.

    He is also an active board member and speaker at various professional associations and forums, such as ISACA, Cloud Security Alliance, and Cybersecurity Collaboration Forum, where he shares his insights and expertise on emerging trends and challenges in the cybersecurity and IT services. His specialties include Risk Management, Information Security Management, Compliance, Data Security, Project Management, Portfolio Management, Program Management, Mergers, Acquisitions and Divestitures, Organization Management, Change Management, and IT Management.

  • speaker photo
    Ryan Mostiller
    Sr. Manager, IT Security, BorgWarner

    Ryan Mostiller is a security leader in the Metro Detroit community, currently serving as the Security Operations Manager for BorgWarner. After more than a decade in both technical and management roles in security, Ryan enjoys any opportunity to engage with fellow practitioners and share learnings. Ryan has worked across various industries and within several Fortune 500 companies, most recently in the automotive industry.

    Ryan has a Masters in IT Management from Oakland University and bachelors in Information Technology, along with security certifications from GIAC. You may have seen other presentations that Ryan has created and presented at, including SecureWorld, GrrCON, ISC2, and Evanta. Ryan has also developed and teaches an OU Executive MBA course at Oakland University titled "Cybersecurity for Executives."

  • speaker photo
    Panel Discussion
  • speaker photo
    Denise Browning, Moderator
    GRC Manager, Little Caesars Enterprises

    Denise Browning is a Governance, Risk, and Compliance Manager with Little Caesars Enterprises. She is a seasoned IT professional with more than 20 years in Information Security in healthcare, automotive, retail, and hospitality industries. She is active with multiple professional organizations, including the Michigan Council of Women in Technology, ISACA, ISSA, WiCyS, and InfraGard. She has worked as an adjunct instructor at Monroe County Community College.

  • speaker photo
    Jim Doggett, Moderator
    CISO, Semperis

    James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.

  • speaker photo
    Barry Eitel
    Editorial Director, National Cybersecurity Alliance

    Barry crafts resources and news reports for the general public and cybersecurity specialists. He has written about technology, finance and small business for Insure.com, Policygenius, and Lendio. He was the Silicon Valley Correspondent for Turkey’s Anadolu Agency. He is also a playwright and screenwriter, and several of his plays have been produced around the country. He received his MFA in Dramatic Writing from NYU Tisch.

  • speaker photo
    Cliff Steinhauer
    Director, Information Security & Engagement, National Cybersecurity Alliance

    Cliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.​

  • speaker photo
    Peter Shamoon
    Sr. Analyst, InfoSec Governance, Risk & Compliance, AlixPartners

    Peter Shamoon serves as the Security Risk Management Senior Analyst at AlixPartners, where he architects and oversees the firm’s security-risk program—from enterprise-wide threat identification and assessment to ongoing control validation and executive-level reporting. Drawing years of experience in risk evaluation, framework governance, and control assurance, he translates complex cyber threats into clear, business-driven actions.

    Peter holds both a bachelor’s and a master’s degree in Cybersecurity & Information Assurance from the University of Detroit Mercy. He is also credentialed as a Certified in Risk and Information Systems Control (CRISC) professional and is Open FAIR certified.

  • speaker photo
    Rhia Dancel
    Technical Manager, Information Security, NSF International

    As Technical Manager, Information Security, at NSF, Rhia Dancel supports clients with risk management within the information security landscape to achieve effective security objectives and goals. Dancel is an Lead CCA, ISO/IEC 27001, 20000-1 and 9001 Lead Auditor for NSF and is the Technical Lead for Cybersecurity Maturity Model Certification program (CMMC).

    Dancel has worked at NSF for over a decade. She previously held several auditing and technical positions in the information security and pharma quality sectors. She has completed technical writing work and audits for NSF throughout North America, working directly with customers on-site and remotely developing security control matrices. She has developed and built a risk-based platform that supports industry best practices for treating and mitigating risk and worked with multiple academic leaders on information security and awareness.

  • speaker photo
    Tony Giles
    Director of Information Security, NSF International

    As Director of Information Security, at NSF, Tony Giles leads the teams that audit and certify organization’s information security systems. Giles is an ISO/IEC 27001, ISO/IEC 20000-1 and ISO 9001 Lead Auditor and is involved with the Cybersecurity Maturity Model Certification program (CMMC). Giles has spent nearly two decades of his career with NSF, having previously served as Director of Custom Audit Programs, Director of Operations, Director of Business Development and Service Delivery Manager. He has conducted audits globally for over 10 years and worked on large-scale security implementation projects, including NIST 800-171, NIST 800-88, ISO/IEC 27001, ISO 28000 and other custom security standards. He has also conducted audits for DoD suppliers and private sector organizations, implementing security assessment programs focused on multiple security controls, cryptographic erasure and other custom security programs.

  • speaker photo
    Panel Discussion
  • speaker photo
    Mary Rowley, Moderator
    Cyber Third-Party Risk Manager, AbbVie

    Mary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning Care Group and Raytheon Technologies, where she built and matured the company’s cyber third-party risk program. She currently serves as Cyber Third-Party Risk Manager at AbbVie. Mary is a graduate from Walsh College with a Master’s degree in Business Information Technology, Information Assurance and holds several certifications including CISSP, CISA and CRISC.

  • speaker photo
    Panel Discussion
  • speaker photo
    Ankit Gupta
    Sr. Security Engineer, Exeter Finance LLC

    Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.

  • speaker photo
    Shilpi Mittal
    Lead IT Security Engineer, Tyson Foods

    Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.

    Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.

    Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.

  • speaker photo
    Panel Discussion
  • speaker photo
    Janette Barretto
    Head of Cybersecurity, Yazaki North & Central America | EMEA

    As a cybersecurity leader, Janette drives global cybersecurity and information security programs, ensuring enterprise-wide protection and compliance with evolving regulations. Her curiosity fuels her passion for learning and staying ahead in the field.

    Collaboration is key to success, whether working with C-suite executives, peers, or cross-functional teams to drive major security initiatives.

  • speaker photo
    Rajesh Nanwani
    Director, Information Security, Roush

    Rajesh is a seasoned cybersecurity leader who has built and led global cybersecurity programs with a strong focus on protecting critical assets and ensuring compliance with frameworks such as CMMC, NIST, SOC 2, and ISO 27K.
    He holds multiple industry-recognized certifications and is dedicated to advancing enterprise security posture through continuous improvement and proactive defense against evolving cyber threats.

  • speaker photo
    Paul Rapier
    Vice President, Information Technology, Detroit Pistons

    Paul Rapier, Vice President of IT for the Detroit Pistons, is a seasoned technology leader with 25 years of IT experience, including a decade in management. Known for his expertise in driving innovation within the sports industry, Paul actively shares his knowledge as a sought-after speaker at cybersecurity conferences and contributes to technology-driven initiatives in professional sports. He also serves on the Advisory Council for SecureWorld Detroit, where he helps shape cybersecurity standards and practices. His diverse skill set enables him to craft IT strategies that enhance efficiency and competitiveness.

  • speaker photo
    Juman Doleh-Alomary, Moderator
    CISO, BorgWarner

    Juman Doleh-Alomary is BorgWarner's Chief Information Security Officer and an active volunteer board member of the ISACA Detroit Chapter.  With over 15 years of experience in security, audit, investigation, compliance, and privacy policy/standards,

    Juman most recently held the position of Director of Cybersecurity GRC at Little Caesar's Enterprises serving the Ilitch holdings portfolio of companies. Her prior positions include Director of IT Audit at Wayne State University and a significant tenure in IT and Risk Management at Ford Motor Company.

    A leader within the ISACA community, Juman has held various roles, including past president and, notably, chair of the IIA/ISACA Spring Conference, which achieved a record attendance. She is active volunteer with Michigan Council of Women in Technology (MCWT), Women Security Alliance (WomSA), and on the advisory board of Women in Cyber (WiCyS) Michigan. 

    An alumnus of the University of Michigan, she holds both a bachelor’s and a master’s degree, complemented by an impressive suite of certifications: CISA, CISM, CRISC, CDPSE, and ISO 27001.

  • speaker photo
    Happy Hour
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.