Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 14, 2020
    9:00 am
    [SecureWorld PLUS] Building an Incident Response Plan from Scratch: If It's Not Written Down, You Don't Have a Plan!
    • session level icon
    9 a.m. - 3 p.m. • Earn 12 CPEs!
    speaker photo
    Attorney, The Cyber Security Law Firm of Texas
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    In today’s world not knowing how your company will respond when it has a breach is negligent. The last thing you want to do is be caught unprepared when the highly likely, but always untimely, event occurs. Businesses of all sizes need to have an incident response plan! Do you? Do you know where to start? If not, this session is for you. In Part 1 of our session will focus on building basic prevention and monitoring capabilities in order to detect incidents. In Part 2 we will focus on building the appropriate incident response plan for your company. Part 3 we will focus on putting the plan in action and building resiliency.
    9:00 am
    [SecureWorld PLUS] Understanding and Using the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
    • session level icon
    9 a.m. - 3 p.m. • Earn 12 CPEs!
    speaker photo
    Professor & Sr. Research Scientist, University of Detroit Mercy
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This course provides in depth awareness of the knowledge, skill, ability (KSA), and competency requirements, of the NIST NICE Cybersecurity Workforce Framework. The student will be given a broad, understanding of the architecture and intent of the NICE model, as well as the purpose and intent of each of the component knowledge, and specialty areas. Students will learn how to design and implement a practical cybersecurity infrastructure solution, that directly applies the job role recommendations, which are specified in the NICE Workforce Model, to the real-world cybersecurity policy guidance requirements of the NIST Cybersecurity Framework.

    Who should attend:
    Any type of C-Level (including CFO and COO)
    Strategic Planners
    Cybersecurity Architects
    Cybersecurity Analysts
    Human Resources Planners

    What will be the audience “take-away”?:
    The student will be able to produce a cybersecurity solution that is tailored to their specific organizational application, which is based on the two most commonly accepted models for cybersecurity best practice.

  • Wednesday, April 15, 2020
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    Humans, the Weakest Link in Cybersecurity [Insider Threat]
    • session level icon
    speaker photo
    Head of Cybersecurity, Tango Networks
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Companies are beginning to realize that Cybersecurity is a must. In this era, systems still need human input for operability. With humans, mishaps happen, clicking a malicious link, mistakenly creating a back door, missing a secure line in a code, can all lead to catersthrophic outcomes. This is where security awareness, and training come in. Super users need to be trained specifically in their role (role based training).
    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)

    8:30 am
    IoT Hazardization: How Can an Enterprise Manage the Risk?
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    As the plethora of connected devices appear in the workplace, enterprises are faced with the daunting task of completing risk assessments and managing the security and safety risks, including their impact to infrastructure and the resulting life / safety risks. This session will review the risk and provide frameworks to help identify the risks and develop security strategies.

    9:30 am
    [OPENING KEYNOTE] Emerging Threats: Real World Stories and Resources to Keep Your Organization Safe
    • session level icon
    speaker photo
    Cyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:30 am
    Location / Room: Keynote Theater

    The Houston area is home to a large portion of the country’s critical infrastructure, including energy, oil, and natural gas pipelines. These facilities ensure the energy independence of the nation, as well as our economic security – and they are also the target of disruptive cyberattacks and espionage efforts from domestic and international threat actors. Sergeant Michael Davis, cyber investigator at the Houston Police Department’s Criminal Intelligence Division and Fusion Center Unit, will share first-hand intel on common threats to the industry, the unique role that Fusion Centers play in addressing these threats, and steps that you can take to ensure your organization is protected.

    10:30 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable - (VIP / Invite Only)
    • session level icon
    Topic: Prioritizing Risk in an Ever Changing Threatscape
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm

    This roundtable is for our Advisory Council Members only.

    11:15 am
    [Securelink] Managing Third-Party Risk: Taming the Vendor Management Monster
    • session level icon
    speaker photo
    CISO, Securelink
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    These days with the number of vendors and other third parties putting their tentacles into your systems and networks, you can feel like you are fighting a multi-headed hydra in trying to limit third-party risk in your IT systems. In this talk, we will discuss the nature of this beast and how to slay it using best practices, technical controls, and good review processes. We will walk through a well-designed vendor management program, including inventorying, risk assessing, on-boarding and off-boarding processes, and audit procedures that will help you tame every hairy, scary vendor on your network so that their weakest links are not yours.
    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)
    11:15 am
    Third-Party Risk: Creating and Managing a Program that Works!
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    Every organization is concerned with third-party risk. No one wants to be the next Target breach. This session will examine the components of third-party risk management and give you some leading practices on how to develop a workable and sustainable process.

     

    11:15 am
    Business Email Compromise: How to Identify and Address this Evolving Global Threat
    • session level icon
    speaker photo
    VP, Global Corporate Security, Bank of New York Mellon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    Business Email Compromise/Email Account Compromise (BEC/EAC) is a sophisticated scam that targets both businesses and individuals who perform legitimate transfer-of-funds requests. The BEC/EAC scam continues to grow and evolve, targeting small, medium, and large business and personal transactions. Employees should be educated about and alert to this scheme. This presentation will review what BEC/EAC scams look like, provide insight into how they continue to evolve, and offer preventative strategies and reactive measures.

    11:15 am
    Present the Security Strategy to the Board for a Budget
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    We will share the strategy of how the VP of IT at APi Group presented the Security Strategy to the Board for budget approval.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Topic: Responsibilities: Should the CISO Bear it All?
    speaker photo
    Director, Enterprise IT Security & CISO, University of Houston
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:15 pm

    This lunch roundtable is for our Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:15 pm
    Location / Room: Keynote Theater
    1:15 pm
    [Panel] Emerging Threats – Hackers and Exploits and Phishing Attacks! Oh My!
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    We all have heard email is the #1 attack vector. Based on the numbers we are seeing; it is pretty indisputable. But what about the other stuff? Zero Day exploits still make headlines. New ransomware attacks every week. IoT devices are easily hacked. BEC/CEO fraud attacks are at an all time high. Will AI be a tool for the hackers? Join our panelists as they share knowledge on the current threatscape and make some predictions on what is coming soon to a network near you.

    1:15 pm
    [Panel] Incident Response - Clean up on Aisle 9. Bring a Mop!
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Just about every week we hear about some new breach, attack, scheme, etc. Sadly, it’s widely accepted in the business world that it is not a case of if but when your will be compromised. When do you get law enforcement involved? PR? The Board of Directors? General council? There is a lot of moving parts that need to be addressed after an incident so, you better have a plan in place AND the right people.  Our panel will help you wrap your head around a proper response plan as well as insights on conducting practice drills and maturing your IR plan.

    2:30 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:45 pm
    Dash for Prizes and CyberHunt Winners Announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    6 Steps to a Powerful Awareness Program that Will Tame Bad Behaviors
    • session level icon
    speaker photo
    Cyber Risk Strategy Manager, Deloitte
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    We all know that people can be a weak link leading to data loss and financial impact, regardless of how strong of a security program is in place. Even though most organizations have mandatory security awareness requirements, they are often a waste of time because the objective is just to check the box. A great security awareness program must be focused on changing users’ behaviors. This session will give you 6 steps to follow to make powerful awareness content that will show users how to behave online.
    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)

    3:00 pm
    Current and Proposed Privacy Regulations and How It Affects Security
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    GDPR and CCPA are two of the many privacy standards that are affecting organizations. How will these regulations impact your organization and where should cryptography and monitoring be used? What are some future regulation and standards around privacy and security that will impact how enterprises’ and individuals’ data may be protected?
    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)

    3:00 pm
    Beyond the Security Awareness Check Box
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    It’s time to move beyond the “Awareness” messaging campaigns and the annual compliance training check box. Employees need to take the next step and act on the knowledge that is constantly pushed out to them. A solid Security Awareness program needs to include opportunities for learners to build their skills as well as practice those skills in realistic scenarios. This session will provide an overview of ways to think beyond doing an annual compliance eLearning and focus on providing on-going learning opportunities that are timely and relevant.
Exhibitors
  • ACFE Houston
    Booth: 280

    We are the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. The mission of the ACFE Foundation is to increase the body of anti-fraud knowledge by supporting future anti-fraud professionals worldwide through the funding of the Ritchie-Jennings Memorial Scholarship Program. The scholarship program provides an opportunity for men and women of all ages, races, religions and income levels to advance their education. Many of these outstanding and deserving students go on to become Certified Fraud Examiners.

  • Checkmarx
    Booth: 270

    Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry’s most comprehensive software security platform that unifies with DevOps and provides static and interactive application security testing, SCA and developer AppSec training to reduce and remediate risk from software vulnerabilities. www.checkmarx.com

  • Chef Software Inc.
    Booth: 150

    Chef Software helps companies become fast, efficient, and secure software-driven organizations. We provide automation capabilities to help organizations manage the complexity lurking below apps, making it easy to deliver and maintain infrastructure and applications that are secure and compliant. Chef helps industry leaders like Walmart, Facebook, and Ford become “coded enterprises,” and we’d love to help you compete in the digital age, too

  • Corelight
    Booth: 180

    Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com 

  • EC-Council
    Booth:

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Fortinet
    Booth: 110

    Fortinet secures the largest enterprise, service provider, and government organizations around the world. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 300,000 customers trust Fortinet to protect their businesses.

  • Global Cyber Alliance
    Booth:

    The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org

  • Gradient Cyber
    Booth: 260

    We uniquely visualize an organization’s cybersecurity risks, reduce logs and alert noise to actionable insights and establish a cyber health roadmap for immediate value and long term improvements to its security posture.

  • InfraGard Houston
    Booth:

    The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.

  • Intsights
    Booth: 120

    IntSights is revolutionizing cybersecurity operations with the industry’s only all-in-one external threat protection platform designed to neutralize cyberattacks outside the wire. Our unique cyber reconnaissance capabilities enable continuous monitoring of an enterprise’s external digital profile across the open, deep, and dark web to identify emerging threats and orchestrate proactive response. Tailored threat intelligence that seamlessly integrates with security infrastructure for dynamic defense has made IntSights one of the fastest-growing cybersecurity companies in the world.

  • ISACA Houston
    Booth: 330

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.

  • ISSA South Texas
    Booth: 340

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • NinjaRMM
    Booth: 160

    NinjaRMM was founded in 2013 to help MSPs and IT professionals simplify their workday with an intuitive and user-friendly RMM. 5 years later and the company has grown to support over 4,000 customers across the globe.

  • Remediant
    Booth: 170

    Founded in the heart of San Francisco, Remediant offers an industry leading Privileged Access Management (PAM) solution we call SecureOne.  Our innovative and enterprise-class cybersecurity solution enables real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them, which is the number one attack vector across all breaches. To learn more, please visit: www.remediant.com

  • SecureLink
    Booth: 100

    SecureLink is a leader in managing secure third-party access and remote support for both enterprise companies and technology providers. SecureLink serves over 400 customers and 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming and retail rely on SecureLink’s secure, purpose-built platform.

  • SIM Houston
    Booth:

    Recognizing the unique needs of the industry, SIM collects the intellectual capital of IT leaders nationwide and offers the resources you need to do business better. Membership in the SIM Houston Chapter continues to grow as well as the number of activities both in educational, community, and social programs.

  • Spirion
    Booth: 190

    Spirion is a leading enterprise data management software solution that provides high-precision searches and automated classification of unstructured and structured data with unparalleled accuracy.  Spirion helps businesses reduce their sensitive data footprint and proactively minimize risks, costs and reputational damage of cyberattacks by discovering, classifying, monitoring and protecting sensitive data.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatConnect
    Booth: 140

    Designed by analysts but built for the team, ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. To learn more about our TIP and SOAR solutions, visit www.ThreatConnect.com

  • Women in CyberSecurity (WiCyS)
    Booth:

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Mary Chaney
    Attorney, The Cyber Security Law Firm of Texas

    Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law.
    Ms. Chaney spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve her country by becoming a Special Agent for the Federal Bureau of Investigation (FBI) where she investigated cybercrime and served as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. In her corporate career, she has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital.
    Voluntarily, Ms. Chaney is the Chairman and CEO of Minorities in Cybersecurity, Inc. which focuses on leadership and career development for minorities and women. Ms. Chaney also holds advisory board roles for the Cyber Law Consortium, Post University and ChickTECH. In each of her volunteer endeavors Ms. Chaney strives to improve the cyber security and privacy community by ensuring both students and professionals have the resources they need to excel in their careers.
    Academically, Ms. Chaney is an adjunct professor with the University of Cincinnati where she teaches courses to assist with the development of the next generation of cybersecurity professionals.
    Professionally, Ms. Chaney owns her own cyber security law practice, The Law Offices of Mary N. Chaney, P.L.L.C., The Cyber Security Law Firm of Texas, where she specializes in helping, the Board of Directors, CIO, CISO and General Counsel of any company, understand each other and to legally protect the enterprise from cyber security risk.

  • speaker photo
    Daniel Shoemaker
    Professor & Sr. Research Scientist, University of Detroit Mercy

    Dan Shoemaker is Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy. He has written eleven books and hundreds of articles in the field. He has been the Principal Investigator for the National Security Agency Center of Excellence at UDM, as well as the Chair of Workforce Training and Education for the Software Assurance Initiative at the Department of Homeland Security. He was a subject matter expert (SME) for the NIST National Initiative for Cybersecurity Education (NICE) Workforce Framework (NICE v1.0 and v2.0) and also the ACM/IEEE CSEC2017 Standard.

  • speaker photo
    Michael Effiong
    Head of Cybersecurity, Tango Networks

    Michael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas, and a DoD non-classified risk management framework certificate. He is currently a PhD candidate at the University of Cumberlands.

  • speaker photo
    Sergeant Michael Davis
    Cyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit

    Sgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Houston-Galveston UASI Regional Fusion Center which supports 17 counties of Southeast Texas.

  • speaker photo
    Tony Howlett
    CISO, Securelink

    Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP, GNSA certifications, and a B.B.A in Management Information Systems. Tony is currently the CISO at SecureLink.

  • speaker photo
    Leland Dean
    VP, Global Corporate Security, Bank of New York Mellon

    Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).

    Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal Justice and Law Enforcement/Police Science in 1983. He received his Master’s in Security Management from the University of Houston-Downtown in 2010. Leland’s certifications include the (Certified Protection Professional (CPP) from ASIS International/GSX; the Certified Financial Security Services Professional (CFSSP) from the Institute of Certified Bankers; and the Certified Fraud Specialist (CFS) from the Association of Certified Fraud Specialists.

    He is a member or chairman of numerous other security and investigative organizations and has been a member of ASIS International since 1987 where he is a member of the Global Terrorism, Political Instability and International Crime Council; the Banking and Financial Services Council; and the Executive Protection Council. Leland is the Houston Chairman of the Financial Services SIG for Infragard and ASIS Houston Financial Security Committee. He is on the Advisory Council of SecureWorld, and is a guest speaker for several security and cyber related issues, and an Adjunct Professor at the University of Houston.

  • speaker photo
    Moderator: Eric Mims
    Director, Enterprise IT Security & CISO, University of Houston
  • speaker photo
    Dr. Paul Berryman
    Cyber Risk Strategy Manager, Deloitte

    Paul Berryman, EdD, CISSP, CISA, is a Cyber Risk Strategy Manager. He’s worked in IT security for almost 2 decades protecting against the usual suspects of hackers, criminals, and bored teenagers. After 6 years of swashbuckling adventures with the US Navy, he’s led several security operation teams. He’s a big fan of colleges, having attended 7 different ones, most recently at the University of Houston where he earned a doctorate specializing in learning and technology. Strong security starts with teaching how to behave online. It isn’t rocket science, but just in case he has a degree in that, too.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store