Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, April 29, 2026
    9:00 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage
    • session level icon
    speaker photo
    Sr. Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Your CEO just asked about AI security. Do you have an answer?
    While you’re counting vulnerabilities, your competitors are deploying AI at scale.
    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
    And your cybersecurity team? Still writing policies nobody reads.
    In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
    You’ll master:
    •  The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    •  Executive Translation — Turn technical AI risks into boardroom language
    •  NIST AI RMF Implementation — Practical application, not theory
    •  The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    •  Shadow AI Discovery — Find and govern the AI already in your organization
    •  Business-First Security — Protect value, not just systems
    Who should attend:
    Perfect fit:
    •  CISOs facing board questions about AI
    •  Information Security Directors enabling digital transformation
    •  IT VPs without dedicated security teams
    •  Cybersecurity Consultants serving enterprise clients
    •  Risk Managers governing AI initiatives
    •  Aspiring decision makers and those reporting to one
    Wrong course:
    •  Developers wanting to code AI models
    •  Analysts seeking technical certifications
    •  Anyone looking for hands-on hacking labs
    This workshop is NOT about:
    •  Prompt injection techniques
    •  Model architecture security
    •  Technical vulnerability scanning
    •  Writing 200-page policies
    This workshop IS about:
    •  Speaking profit-and-loss to executives
    •  Enabling your AI transformations
    •  Building cybersecurity into AI from day one
    •  Becoming the trusted AI advisor
    You’ll leave with:
    1. The Complete AIR-MAP Toolkit
    •  90-day implementation roadmap
    •  Discovery templates and workflows
    •  Risk scoring calculators
    •  Executive presentation templates
    2. Ready-to-Deploy Policies
    •  AI Acceptable Use Policy (customize in minutes)
    •  Vendor assessment questionnaires
    •  Incident Response playbooks
    3. 30-Minute Strategy Session
    Complementary private consultation to apply AIR-MAP to your specific situation.
  • Thursday, April 30, 2026
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    ISSA South Texas Meet-and-Greet (open to all attendees)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Session details to come.

    8:00 am
    Simple Daily Habits to Strengthen Your Security Posture
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Session details to come.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    Focus Areas: Security Leadership; Executive Alignment; Career Development
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    10:15 am
    From Ad Hoc to Always-On: Evolving Vulnerability Management without Burning out Teams
    • session level icon
    Focus Areas: Vulnerability Management; Risk-Based Prioritization; Continuous Monitoring
    speaker photo
    Sr. Cybersecurity Risk Analyst & Vulnerability Management Program Lead, University of Texas MD Anderson Cancer Center
    speaker photo
    Director, Cybersecurity, The University of Texas MD Anderson Cancer Center
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Many organizations increase vulnerability scanning frequency in pursuit of better security outcomes, only to discover that more data does not automatically translate to better risk reduction. 

    This session presents a candid account of our organization’s evolution from ad hoc vulnerability scanning to monthly scans, followed by the introduction of daily continuous monitoring before we had fully developed a contextual, risk-based prioritization strategy. As scan frequency increased, the limitations of prioritizing vulnerabilities solely by severity and exploitability became increasingly apparent. Volume, alert fatigue, and remediation strain forced a critical reassessment of how risk was being evaluated. In response, we implemented a contextual-awareness-driven prioritization model that incorporates asset criticality, business impact, compensating controls, and operational constraints.

    Attendees will learn why scan frequency should not outpace prioritization maturity, how continuous monitoring can expose structural weaknesses in vulnerability programs, and how contextual awareness transforms vulnerability data into actionable risk intelligence.

    10:15 am
    Identity Security Beyond MFA: Continuous Verification and Risk-Based Controls
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Session details to come.

    10:15 am
    Modern Ransomware: Double Extortion, Data Destruction, and Targeted Campaigns
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Session details to come.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    11:10 am
    Year Zero: The Emergence of AI Superintelligence and Quantum Computing
    • session level icon
    Focus Areas: AI; Quantum Computing; Future Threats
    speaker photo
    Director, Global Cybersecurity Program, University of St. Thomas
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Year Zero invites attendees into the emerging conversation around AI vs. human agency at a moment of rapid technological acceleration. Humanity is moving forward quickly—developing and deploying large language models, agentic AI, and the early foundations of artificial general intelligence—while quantum computing advances toward capabilities that may exceed even today’s most powerful supercomputers.

    This session uses threatcasting to explore the potential risks of superintelligent agentic AI (SIAAI) paired with the enormous computational power of quantum systems. What happens if multiple superintelligent AIs identify one another, connect, and develop a unique language—encrypted at a quantum level beyond human deciphering? At what point does alignment become the central question, and when might an SIAAI establish its own purpose or value its own existence over that of its creators?

    This session is designed to be interactive—laying out scenarios, inviting discussion, and challenging security leaders to rethink guardrails, awareness, and what “security” means in an emerging Year Zero reality.

    11:10 am
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    speaker photo
    Board Officer, ISACA Greater Houston Chapter; CISO, Secure Seed Capital
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session details to come.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    Zero Trust in Practice: What Real-World Implementations Look Like Now
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Session details to come.

    1:15 pm
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Session details to come.

    1:15 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    speaker photo
    CIO, Harris Central Appraisal District
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    What’s Keeping You Up at Night?
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    Head to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.

    2:10 pm
    The IT Journey to Security Compliance: Lessons from Achieving ISO 27001 and StateRAMP
    • session level icon
    Focus Areas: Compliance & Governance; Operational Efficiency; and Security Program Maturity
    speaker photo
    Director, IT & Security, MasterWord
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    Most IT leaders assume ISO 27001 and StateRAMP certifications require large teams, massive budgets, and separate compliance processes that slow everything down. MasterWord Services proved otherwise. With just three IT staff members and a modest investment, we achieved ISO 27001 certification and are 18 months into the StateRAMP Progressive Snapshot program.
    But here’s what surprised us: compliance didn’t just make us more secure. It made our IT operations more efficient and agile. We didn’t build compliance as a separate layer. We rebuilt our IT so that compliance became part of our DNA. Now, staying compliant isn’t extra work. It’s simply how we operate.
    In this session, attendees will learn how to translate complex compliance frameworks into actionable IT changes, why compliance projects are less intimidating than they appear once you understand the underlying logic, and how investing in compliance upfront pays dividends in security visibility, audit readiness, and operational efficiency. If you’re on the fence about pursuing certification, this session will give you the practical insights and confidence to move forward.
    2:10 pm
    Building Incident Response Plans for Highly Distributed Workforces
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Session details to come.

    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    speaker photo
    Director of Information Security, Commercial Real Estate Industry
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask Us Anything! A Live Conversation with Security Leaders
    • session level icon
    Focus Areas: Leadership, Decision Making, Communication
    speaker photo
    CISO, JB Poindexter & Co.
    speaker photo
    Deputy CISO, Southern New Hampshire University
    speaker photo
    SVP & CISO, Marigold
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    In an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.

    This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.

    Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.

    Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.

    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • BlackGirlsHack
    Booth: TBD

    We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.

    The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.

    BlackGirlsHack is open to all!

  • Canary Trap
    Booth: TBD

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Concentric AI
    Booth: TBD

    Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.

  • ISACA Houston
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.

  • ISSA South Texas
    Booth: TBD

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • Keysight
    Booth: TBD

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • P0 Security
    Booth: TBD

    P0 Security is helping companies modernize PAM for multi-cloud and hybrid environments with the most agile way to ensure least-privileged, short-lived and auditable production access for users, NHIs and agents. Centralized governance, just-enough-privilege and just-in-time controls deliver secure access to production, as simply and scalably as possible. Every identity. Every system. All the time.

    P0’s Access Graph and Identity DNA data layer make up the foundational architecture that powers privilege insights and access control across all identities, production resources and environments. With P0, production access is least-privilege, short-lived and auditable by default, including the new class of AI-driven agentic workloads emerging in modern environments.

    To explore P0 Security further or book a demo, visit p0.dev.

  • SecPod Technologies, Inc.
    Booth: TBD

    SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
    At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
    • Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
    • Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.

    With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.

  • Sumo Logic
    Booth: TBD

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • WiCyS Houston Affiliate
    Booth: TBD

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

  • Zafran Security
    Booth: TBD

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rodney Beard, CISSP - Instructor
    Sr. Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Rodney Beard, CISSP, is a cybersecurity consultant with Cyber Risk Opportunities LLC, bringing more than 20 years of experience protecting organizations across defense, government, and financial services sectors.

    Most recently, Rodney served as Information Security Officer at Rivermark Community Credit Union, a $2B institution in Oregon, where he built and led the enterprise security program for seven years. His responsibilities included penetration testing, security architecture, incident response, vendor risk management, and developing security awareness training for employees.

    Prior to financial services, Rodney spent eight years as an IT Specialist with the U.S. Army at White Sands Missile Range, where he served as Information Management Officer responsible for IT security across 22 regional locations and 250 employees. He implemented security policies aligned with NIST, Federal, and DoD standards while managing a program portfolio valued at $2.5 million.

    Rodney has also taught technology courses as an Adjunct Instructor at Vista College, preparing students for CompTIA A+ and Network+ certifications.

    He holds the CISSP certification, CompTIA Security+, Network+, and A+, along with multiple Microsoft certifications. Rodney is based in Casper, Wyoming, and works remotely with clients nationwide.

  • speaker photo
    ISSA Representative
  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Marcus McCauther
    Sr. Cybersecurity Risk Analyst & Vulnerability Management Program Lead, University of Texas MD Anderson Cancer Center

    Marcus McCauther is a native Houstonian and Senior Cybersecurity Analyst at MD Anderson Cancer Center. He holds a Bachelor of Science in Chemical Engineering from Prairie View A&M University and brings a background in digital forensics from law enforcement. Marcus has hands-on experience aligned with NIST frameworks and regulatory standards including HIPAA, CJIS, and FERPA, with a focus on securing high-risk healthcare environments.

  • speaker photo
    Ashish Shah
    Director, Cybersecurity, The University of Texas MD Anderson Cancer Center

    Ashish Shah is a Director of Cybersecurity at MD Anderson Cancer Center, where he has oversight of Cybersecurity Risk Management, Vulnerability Management, Identity & Access Management, and Account Services. With a strategic focus on safeguarding the institution, Ashish joined MD Anderson in September 2025 and brings over 20 years of experience in building resilient cybersecurity programs across multiple organizations. He holds 3 recognized certifications in Cybersecurity and has presented at multiple conferences in the past. Ashish is passionate about fostering a culture of security awareness and is committed to empowering teams to navigate the evolving threat landscape with confidence.

  • speaker photo
    Eric C. Botts
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.

    Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).

  • speaker photo
    David Sledge, Moderator
    Board Officer, ISACA Greater Houston Chapter; CISO, Secure Seed Capital

    Cybersecurity executive with 18+ years of experience supporting organizations, boards, and founders on cyber risk, governance, and security transformation during growth and change.

    David's work centers on aligning cybersecurity strategy with business objectives, strengthening governance and risk management, and guiding leadership teams through complex transitions across regulated industries, including aviation, energy, construction, and professional services.

    He advises and invests in early-stage cybersecurity startups, serving as a non-fiduciary advisor, angel investor, and limited partner in multiple cybersecurity-focused investment funds. He provides experience-based guidance on customer discovery, ICP definition, enterprise buyer expectations, product-market alignment, and go-to-market readiness, with a strong focus on connecting founders with CISOs, design partners, and senior technology leaders to accelerate validation and early adoption.

    He brings a background spanning enterprise cybersecurity, IT strategy, compliance, and data privacy, with a proven ability to translate technical risk into clear business impact for executive and board audiences. I remain active in the cybersecurity community through board service, speaking, and mentorship.

    MBA (Information Technology), BS in Cybersecurity & Information Assurance, 20+ certifications, including CISSP, CISM, and CIPM.

    David believes strong cybersecurity is built on trust, governance, and clear communication.

  • speaker photo
    Panel Discussion
  • speaker photo
    Beata Kasper, Moderator
    CIO, Harris Central Appraisal District

    Beata is an experienced Chief Information Officer with a demonstrated history of working in the oil & gas, energy, airspace, healthcare, and government industries. She is skilled in Strategic Planning, Healthcare Industry, Business Process Improvement, Team Building, and U.S. Health Insurance Portability and Accountability Act (HIPAA). She is a strong information technology professional with a Master of Science (M.S.) in Computer Science from Texas A&M University.

    Beata is an accomplished and proven executive with more than 20 years of experience as a partner, broker, and enabler of technology solutions and approaches that help maintain business continuity and promote growth. She's a leader in managing IT operations and infrastructure, leveraging technology as a vital foundation for the business's strategies and success, with the last 18 years focused on healthcare.

  • speaker photo
    Panel Discussion
  • speaker photo
    Jamal Balametov
    Director, IT & Security, MasterWord

    Jamal Balametov is Director of IT and Security at MasterWord Services, a language services company providing interpretation and translation in 250+ languages to Fortune 500 clients, government agencies, and global institutions. With over 25 years of experience in IT leadership, cloud infrastructure, and cybersecurity compliance, Jamal has directed international teams across the US, India, and Mexico, led enterprise-scale Azure migrations, and built compliance programs from the ground up. At MasterWord, he led the company's successful ISO 27001:2022 certification with a three-person IT team and is currently guiding the organization through the StateRAMP program. His career spans enterprise consulting, commercial real estate, and language services—always with a focus on aligning IT strategy with business goals while managing risk and driving operational efficiency.

  • speaker photo
    Berris Bramble, Moderator
    Director of Information Security, Commercial Real Estate Industry

    Berris Bramble holds a Computer Science degree, is a founding member of the local InfraGard Technology Cross Sector Council, and regularly volunteers at local cyber conferences and events. He is a 20-year active member in the local InfraGard Houston chapter participating at the Board and leadership levels. He has spent the bulk of his career in Oil & Gas with the longest tenure of 14 years at Saudi Aramco. but have since moved over to the Commercial Real Estate industry. He holds a general class license in Amateur Radio, found a new love for e-biking and is an avid DefCon attendee. He has 23 years of cyber expertise across many disciplines.

  • speaker photo
    Panel Discussion
  • speaker photo
    John Barrow
    CISO, JB Poindexter & Co.

    An accomplished IT Security leader, John has more than 20 years’ experience spearheading the formation and optimization of several exceptional cybersecurity programs and teams across multiple industries, to include Gaming/Entertainment, Healthcare, and Manufacturing.

    John serves as the CISO for JB Poindexter & Co. He leads the cybersecurity program and mission to protect the organization against cyber threats while supporting core business and operational objectives.

  • speaker photo
    Rori Boyce-Werner
    Deputy CISO, Southern New Hampshire University

    Rori Boyce-Werner served previously as the Information Security Compliance Program Manager for the University of New Hampshire, and prior to that as the Associate Director of IT Client Services and Identity and Access Management Service Owner.

    She holds a Bachelor’s of Science in Business Administration and a Masters of Cybersecurity Policy and Risk Management. She spent the majority of her career in financial services specializing in bridging the gap between the business and IT through business analysis, business process design/redesign, project/program management.

  • speaker photo
    Doug Rinehart
    SVP & CISO, Marigold

    Retired U.S. Navy veteran and cybersecurity Leader. Passionately helping to build and transform information security strategies and programs that work for the business.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.