Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 17, 20239:00 am[PLUS Course] Real-World Cyber Risk Management and Resilience PlanningCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmKey components covered include:
1) Lifecycle for investigating and responding to a cyberattack (such as a ransomware attack)
2) The legal, compliance, and regulatory issues that arise from such attacks
3) Legal and regulatory requirements for cyber risk management programs
4) Assessing and understanding the real-world business impact cyber risk has on the company
5) Prioritizing risks and developing a strategic action plan to execute
6) Implementing simple and cost-effective strategies that take into account legal, compliance, and regulatory requirements
7) The role of cyber insurance in overall resilience and incident response preparation - Thursday, May 18, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:50 amParticipating professional associations and details to be announced.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] CISO Panel: Lessons Learned and Advice for the Next Generation of Cybersecurity ProfessionalsCISO, Speaker, Advisory Board Member; Founder, Cyber Point AdvisoryCISO, State of North DakotaCybersecurity Engineering Manager, SchlumbergerCISO & Fellow Emeritus, SchlumbergerRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession description coming soon.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amTransformational and Change Efforts: Why Do They Fail?Principal, CI5O Advisory Services LLCRegistration Level:Conference Pass
10:15 am - 11:00 amIncredible risk and disruption are driving the need for companies to adopt and drive transformational and change efforts. However, the track record and return on these investments are horrible. Success requires different skill sets. Traditional approaches are not transformative or agile enough. Oftentimes, management appears to be going through the motions on these efforts or setting them up for failure. Traditional approaches of handling cyber, analytics, edge and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results.
As the winner of the 2022 Orbie Leadership and 2019 Superglobal CIO of the Year Awards, Al Lindseth has been a thought leader within the energy sector and IT profession for many years. He left Plains All American in mid-2022 to support organizations with what he describes as the crunch issue of how growing risks like supply chain and cybersecurity, and other major disruptive forces, are managed amid a need to democratize and expand technology within an increasingly connected workplace.
Focusing on technology-driven disruption or change efforts, Lindseth will posit five specific reasons why these efforts fail with a goal for attendees to learn how to avoid these issues with the right approach.
Incredible risk and disruption are driving the need for companies to adopt and drive transformational and change efforts. However, the track record and return on these investments are horrible. Success requires different skill sets. Traditional approaches are not transformative or agile enough. Oftentimes, management appears to be going through the motions on these efforts or setting them up for failure. Traditional approaches of handling cyber, analytics, edge and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results.
As the winner of the 2022 Orbie Leadership and 2019 Superglobal CIO of the Year Awards, Al Lindseth has been a thought leader within the energy sector and IT profession for many years. He left Plains All American in mid-2022 to support organizations with what he describes as the crunch issue of how growing risks like supply chain and cybersecurity, and other major disruptive forces, are managed amid a need to democratize and expand technology within an increasingly connected workplace.
Focusing on technology-driven disruption or change efforts, Lindseth will posit five specific reasons why these efforts fail with a goal for attendees to learn how to avoid these issues with the right approach.
10:15 am[SentinelOne] The Future of Cybersecurity Is AutonomousRegistration Level:Open Sessions
10:15 am - 11:00 amSession description coming soon.
10:15 amWeb Application APIs: Building a Modern Approach to Vulnerability TestingPrincipal Solutions Director | Client Solutions Architect, WinmillRegistration Level:Open Sessions
10:15 am - 11:00 amWeb application programming interfaces (APIs) present a huge, yet still under-protected, attack surface. Although business innovation pathways are crucial for growth, they also dramatically increase the web attack surface, leaving organizations exposed to attacks that target APIs in order to directly access sensitive data and functionality.
Legacy AppSec approaches have not necessarily kept pace with technical developments, leaving organizations struggling to reconcile multiple testing tools and processes while potentially overlooking web application APIs in their security programs. The state of AppSec maturity directly impacts the ability of organizations to innovate and optimize processes crucial to ensure effective API attack surface coverage.
Join us for an overview of the importance of including APIs in web application security testing and how you can develop a modern approach towards vulnerability testing that covers the entire attack surface of modern web applications, from development to production. Topics include:
- The importance of web APIs and web services in software development
- The challenges of including APIs in application security testing, and how to overcome them
- The security and efficiency benefits of a mature, comprehensive, and integrated AppSec program
11:10 amCybersecurity Really Is a Team SportCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:Conference Pass
11:10 am - 11:55 amWhy strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams.
11:10 am[Exabeam] Goodbye SIEM Effectiveness GapRegistration Level:Open Sessions
11:10 am - 11:55 amSession description coming soon.
12:00 pm[Lunch Keynote] CISA Services for Cybersecurity ResilienceDirector, Region 6, CISARegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession description coming soon.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Sponsored by Skybox SecurityRegistration Level:VIP / Exclusive
12:00 pm - 12:45 pmDiscussion Topic — Finding Cyber Risk Blind Spots: When ‘Good Enough’ Isn’t
In today’s complex interweaving of environments, understanding the risks that affect critical business flows is growing more difficult than ever. Today’s cyber leaders face threats within and without, benign and malignant, and still need to move at the speed of business. In this talk, we will explore the challenges in identifying and quantifying cyber risk, the impact of an incomplete risk assessment, and possible mitigation approaches.
Sponsored by:
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pm[Panel] What Academia Is Doing to Prepare Next-Gen Cybersecurity ProfessionalsDirector, Global Cybersecurity Program, University of St. ThomasAssistant Professor, Baylor UniversityDean of the College of Science and Engineering, Houston Christian UniversityAssociate Professor, University of HoustonCISO & Fellow Emeritus, SchlumbergerRegistration Level:Conference Pass
1:15 pm - 2:15 pmCybersecurity talent demand will continue to rise in the next few years. This esteemed panel addresses ways to close the cybersecurity talent gap, from what academia is doing to what the cybersecurity industry and organizations from all verticals can do to help. This panel also touches on career change, mentoring programs and internships.
1:15 pm[Panel] There’s a Bad Moon on the Rise – Are You Ready?Identifying the Current Threat LandscapeRegistration Level:Open Sessions
1:15 pm - 2:15 pmLike the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.
The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.
Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pmDemocratizing Threat Modeling Across the EnterpriseVice President, Architect & Threat Modeling Center of Excellence Lead, JPMorgan Chase & Co.Vice President & Security Architect, JPMorgan Chase & Co.Registration Level:Conference Pass
2:30 pm - 3:15 pmKey Take-Away: Understand how to better plan, deliver, and execute Threat Modeling across the enterprise.
This presentation will help answer the following questions and more:
- How do you apply governance principles to Threat Modeling?
- How to apply Threat Modeling across multiple engagement types?
- How do you develop and execute the best training plan for your organization?
- How do you ensure enterprise stakeholders including cybersecurity teams and different lines of business benefit from Threat Modeling as a service on an ongoing basis?
2:30 pmAn Honest Peer-Driven Conversation About Cyber InsuranceRegistration Level:Conference Pass
2:30 pm - 3:15 pmCyber insurance is no longer a “do I need it?” but a must-have for organizations. This conversation among cybersecurity peers will discusse how to properly assess insurance programs, including a candid look into how the organization should drive what is and is not covered, not the insurance provider.
2:30 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Open Sessions
2:30 pm - 3:15 pm3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pmThe CISO: Chief in Name OnlyDirector, Information Security, Southwestern EnergyVP of IT Security & Compliance, Cornerstone Capital BankCISO, AECOMSVP & CISO, ABM IndustriesCISO, ConocoPhillipsCISO, Speaker, Advisory Board Member; Founder, Cyber Point AdvisoryRegistration Level:Conference Pass
3:45 pm - 4:30 pmToday’s CISO is expected to be a unicorn – developing roadmap and strategy and executing them, establishing rapport within and outside IT, leading the team to cultivate and retain talents, staying up to date with the latest cybersecurity news and trends, communicating with the board, being a salesperson pitching solutions, putting out fires, and on and on. In some cases, they are not given the appropriate authority or the resources, resulting in making security decisions purely based on economic reasons versus risk-based. This session explores how to navigate being a CISO and figuring out how to truly be the “Chief” of infosec, a critical thread that affects every piece of the organization.3:45 pmA Whole Lotta BS (Behavioral Science) About CybersecurityExecutive Director, National Cybersecurity AllianceRegistration Level:Open Sessions
3:45 pm - 4:30 pmLet’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security. We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.
- Arctic Wolf NetworksBooth: TBD
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AuditBoard, IncBooth: TBD
AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies
looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.
- CloudflareBooth: TBD
Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.
Secure your websites, APIs, and Internet applications.
Protect corporate networks, employees, and devices.
Write and deploy code that runs on the network edge. - CRESTBooth: n/a
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- ISSA South TexasBooth: TBD
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- OktaBooth: TBD
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- SentinelOneBooth: TBD
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- Skybox SecurityBooth: TBD
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- UptycsBooth: TBD
Inspired by CRM and business process analytics, the Uptycs vision is to empower security teams with the same real-time decision making, driven by structured telemetry and powerful analytics.
By providing a unified view of cloud and endpoint telemetry from a common solution, making every user and platform action auditable, and having an open and extensible API, we eliminate black-box operations, reduce tool sprawl, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces.
- Winmill + InvictiBooth: TBD
Winmill is a technology services company that provides expert consulting services in Application Development, Application Security, PPM, Data Center & Cyber Security, and Identity & Access Management. Founded in 1994, Winmill is a technology services company headquartered in New York City. We have five core practices: Software Development, Cyber Security, DevOps, Data Center, and Cloud. We support the entire technology lifecycle. We are dedicated to providing exceptional service by building systems that make our clients more competitive. One of our hallmarks is a knowledge transfer process that maximizes the skills and intellect of your own team.
Invicti Security is transforming the way web applications are secured. An AppSec leader for more than 15 years, Invicti enables organizations in every industry to continuously scan and secure all of their web applications and APIs at the speed of innovation. Invicti provides a comprehensive view of an organization’s entire web application portfolio, and powerful automation and integrations enable customers to achieve broad coverage of even thousands of applications. Invicti is headquartered in Austin, Texas, and serves more than 3,500 organizations of all sizes all over the world.
- Shawn E. Tuma, InstructorCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Dd (Catharina) BudihartoCISO, Speaker, Advisory Board Member; Founder, Cyber Point Advisory
- Michael GreggCISO, State of North Dakota
Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
- Adnan HussainCybersecurity Engineering Manager, Schlumberger
- Mario Chiock, ModeratorCISO & Fellow Emeritus, Schlumberger
Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community.
Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating
Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. In 2018 was awarded the South Central Region InfraGard Award for “INMA Leadership!”.
Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member.
Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. Co-Author of "Navigating the Digital Age, Second Edition."
- Al LindsethPrincipal, CI5O Advisory Services LLC
- Ben DiMolfettaPrincipal Solutions Director | Client Solutions Architect, Winmill
Ben DiMolfetta is a Professional Services Director and AppSec Client Solutions Architect for Winmill Software, a technology services company headquartered in New York City. With over 30 years of industry experience, Ben is a highly qualified AppSec implementation architect, systems developer, project manager and educator, and holds the following industry recognized certifications: Checkmarx Engineer (CxCE), Project Management Professional (PMP), CompTIA Data+ Practitioner, and Technical Trainer (CTT+). Ben is a 1990 graduate of Binghamton University (SUNY), where he earned a BS in Computer Science/Information Science.
- Shawn E. TumaCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Harvey PerriottDirector, Region 6, CISA
Harvey O. Perriott currently serves as the Regional Director for the Cybersecurity and Infrastructure Security Agency (CISA), Region VI headquartered in Irving, TX. His staff overseas risk management, and both physical and cyber security activities for private and public sector partners across five states including Arkansas, Louisiana, New Mexico, Oklahoma, and Texas. He regularly interacts with state and local Homeland Security officials and is the CISA Director’s representative to Region VI stakeholders.
Prior to this assignment, he served as the Chief, Protective Security for CISA Region VI providing leadership and management to a team of 13 Protective Security Advisors (PSAs) across 5 states. His PSAs supported infrastructure risk management and acted as emergency management and physical security advisors to Federal, State, local, and Tribal officials. Prior to this assignment, he served as the Protective Security Advisor for the North Texas District from 2006-2017.
From November 2004 until June 2006, Mr. Perriott served as the Staff Director for the Office of Infrastructure Protection’s Risk Management Division located in Washington, DC. In this capacity he facilitated the daily operations of a division consisting of 130 federal and contract personnel.
Mr. Perriott brings extensive experience and training to the agency in the fields of security, counterterrorism, and special operations. With over 25 years’ experience in U.S. Special Operations, Mr. Perriott has been involved in various military operations directed at counterterrorism activities. Mr. Perriott was recognized for his contributions to Operation ENDURING FREEDOM with a Bronze Star Medal. He has served within CISA or its predecessors for 17 years.
Mr. Perriott holds a Bachelor’s Degree in Human Resource Management and a Physical Security Professional certification with the ASIS; he has an in-depth knowledge of technical and physical security, threat and vulnerability assessments, analysis of requirements, and the development of operational plans. He has been married for over 33 years, with two children and one grandson.
- Eric C. BottsDirector, Global Cybersecurity Program, University of St. Thomas
Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.
Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).
- Carlos TorresAssistant Professor, Baylor University
Carlos I. Torres is an assistant professor in the Information Systems and Business Analytics department at the Hankamer School of Business at Baylor University. He received his PhD in Business Administration with a concentration in Information Systems from Washington State University. He also holds a MIB from Florida International University, MBA from Universidad de Los Andes in Colombia, as well as a bachelor’s degree in computer science (Summa Cum Laude honors) from Universidad Industrial de Santander in Colombia.
Torres’ research focuses on behavioral factors related to information technology, including information security and privacy, computer self-efficacy (CSE) and Artificial Intelligence (AI). His work has appeared in journals such as AIS transactions in Replication Research, as well as in several conference proceedings such as AMCIS, HICSS, ICIS (WISP), and DRW. Carlos currently has several papers under review at premier IS Journals.
Torres has extensive industry experience as well in information technology product management. He worked in the Americas and Europe, leading 3G and 4G wireless network implementations and business case evaluations. He also led the design and successful launch into the market of value-added services and new products over wireless networks, as well as developed value-creation initiatives through marketing innovation and big data analytics in the Telecom Latin American market.
- Dr. Katie EvansDean of the College of Science and Engineering, Houston Christian University
Dr. Katie Evans is a Professor of Mathematics and the Dean of Science and Engineering at Houston Christian University (HCU). Prior to HCU, she was on faculty at Louisiana Tech University for 16 years in the College of Engineering and Science, where she served in various administrative roles and is now Professor Emerita. Dr. Evans serves in leadership of the Grand Challenges Scholars Program, founded by the U.S. National Academy of Engineering. She earned her B.S. in Mathematics from Morehead State University and an M.S. and Ph.D. in Mathematics at Virginia Tech, followed by a postdoctoral position in Mechanical Engineering at Oregon State University.
- Deniz GurkanAssociate Professor, University of Houston
Deniz Gurkan received her BS and MS degrees in Electrical Engineering from Bilkent University, in Ankara, Turkey, in 1996 and 1998, respectively. Her PhD is also in Electrical Engineering, received from the University of Southern California in 2003. She briefly worked as a lecturer at the California State University in Long Beach, Electrical Engineering and the Claremont Graduate University, Applied Mathematics departments while also conducting research explorations as a post-doc at the USC's Information Sciences Institute. She then joined the faculty at the University of Houston in 2004. In her tenure at UH, her research has evolved into fiber-optic sensors, sensor networking, distributed systems, network measurements, network infrastructure, and software-defined networks. She is now the director of the UH Networking Lab which has a software-defined infrastructure (SDI) testbed where networking research is conducted with advanced software development practices and sponsored by federal agencies as well as industry by more than $2.5 million during the last five years. Her lab develops and maintains a suite of software frameworks that range from network resource orchestration to advanced services for learning platforms. She develops and utilizes her own materials for teaching computer networking foundations with a strong focus on lower layer fundamentals and functional protocol observations in a lab environment. Her course modules include content for basic networking, network programming, network troubleshooting, and cybersecurity in the network layer. Her recent research interests are on network security, network traffic modeling, network resource management, and network function design and development. Her research has been funded by federal programs and industry, resulting in over 60 peer-reviewed articles in leading journals and supervision of over 70 students at MS and PhD levels. She is the faculty advisor of the UH Women in Cybersecurity (WiCyS) student chapter. She is also an active member of her community through her volunteering role as a leader in the BSA Scouting troops of both of her children, as a mentor and a judge in organizations such as the NCWIT (National Center for Women and Information Technology), in teaching networking to high school teachers and students formally through NSF-RET and informally by outreach, and through running workshops on career advancement in various venues such as the AAUW (American Association of University Women) STEM outreach to middle schools.
- Mario Chiock, ModeratorCISO & Fellow Emeritus, Schlumberger
Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community.
Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating
Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. In 2018 was awarded the South Central Region InfraGard Award for “INMA Leadership!”.
Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member.
Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. Co-Author of "Navigating the Digital Age, Second Edition."
- Panel Discussion
- Karen HarrisVice President, Architect & Threat Modeling Center of Excellence Lead, JPMorgan Chase & Co.
Karen Harris is an IT professional with over 20 years global banking and finance technical operations and strategy expertise, including threat modeling and cyber intelligence delivery. Prior to JP Morgan Chase, Karen recently worked at Capital One and Bank of America, where as senior architect and threat modeling manager she helped implement threat modeling tools, policies, and threat modeling training programs.
- Annie JamshedVice President & Security Architect, JPMorgan Chase & Co.
Annie Jamshed is a Cyber Security Professional with Bachelor in Electrical Engineering and Master in Cyber Security. She has more than four years' experience working in Security Operations Center performing incident response, forensics and threat intelligence. She is currently working at JP Morgan Chase as a Security Architect and a threat modeling practitioner. Annie is very active in the Houston area Cyber Security community. She serves as President for WiCyS Houston Affiliate and Speaker Wrangler for HouSecCon. She holds CISM, GNFA, GCTI, and CompTIA Sec+.
- Julie BoehlDirector, Information Security, Southwestern Energy
- Ionel ChilaVP of IT Security & Compliance, Cornerstone Capital Bank
- Paul DialCISO, AECOM
- Stephanie Franklin-Thomas, PhDSVP & CISO, ABM Industries
- Annessa McKenzieCISO, ConocoPhillips
- Dd (Catharina) Budiharto, ModeratorCISO, Speaker, Advisory Board Member; Founder, Cyber Point Advisory
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your cybersecurity community for learning and professional growth. Sign up today!
