Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 28, 2020
    9:00 am
    [SecureWorld PLUS] Understanding and Using the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
    • session level icon
    9 a.m. - 3 p.m. • Earn 12 CPEs!
    speaker photo
    Professor & Sr. Research Scientist, University of Detroit Mercy
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This course provides in depth awareness of the knowledge, skill, ability (KSA), and competency requirements, of the NIST NICE Cybersecurity Workforce Framework. The student will be given a broad, understanding of the architecture and intent of the NICE model, as well as the purpose and intent of each of the component knowledge, and specialty areas. Students will learn how to design and implement a practical cybersecurity infrastructure solution, that directly applies the job role recommendations, which are specified in the NICE Workforce Model, to the real-world cybersecurity policy guidance requirements of the NIST Cybersecurity Framework.

    Who should attend:
    Any type of C-Level (including CFO and COO)
    Strategic Planners
    Cybersecurity Architects
    Cybersecurity Analysts
    Human Resources Planners

    What will be the audience “take-away”?:
    The student will be able to produce a cybersecurity solution that is tailored to their specific organizational application, which is based on the two most commonly accepted models for cybersecurity best practice.

    9:00 am
    [SecureWorld PLUS] Ethical Hacking Made Easy (Includes Hands-On Exercises)
    • session level icon
    9 a.m. - 3 p.m. • Earn 12 CPEs!
    speaker photo
    Chief Cybersecurity Analyst, Alpine Security
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Learn the basics of ethical hacking with an easy to follow framework. This course introduces the methodology behind computer and network exploitation through a hands-on approach. In this course, you will perform active and passive reconnaissance, network enumeration, vulnerability identification, and various exploitation techniques. This course includes extensive hands-on activities.
    Required: Attendees must bring a laptop with a minimum of 8GB of RAM and 100GB of hard drive space. Hands-on exercises will be performed in a VirtualBox environment. You must be able to install VirtualBox on your system and add virtual machines to VirtualBox. The virtual machines required for this course will be made available for download 10 days prior to the start date.

  • Wednesday, April 29, 2020
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Breakfast – (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am

    This session is for our Advisory Council members only.

    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    Industrial Control Systems and Cybersecurity
    • session level icon
    speaker photo
    Cybersecurity Compliance Manager, Electric Power Systems International
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    Industrial Control Systems are everywhere and have an impact on our lives every day.  If they are not protected properly, we could lose access to electricity, oil & gas, and even food.  This presentation will look at what an Industrial Control System is, what the possible dangers are, and how to best protect them.

     

    8:30 am
    7 Ways to Boost InfoSec’s Influence (and Yours) by Communicating Differently
    • session level icon
    speaker photo
    Director of Media & Content, Podcast Host, SecureWorld
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by thinking differently about how you communicate. Whether your audience is the board, your team, or any part of the business, this session will help you and your communication stand out. Lead by a long-time TV reporter turned cybersecurity journalist who shares a framework for powerful communication you can implement immediately.

    8:30 am
    Privacy Dark Patterns: Can You Spot Them?
    • session level icon
    speaker photo
    President, American Cyber Security Management (ACSM)
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    Have you ever wondered how that extra product arrived in your eCommerce cart? Do you ever find yourself in an circular process of online approval? Are you tired of giving away too much of your personal information for a simple online service? This presentation explores many of the known and unknown online privacy traps, know as Dark Patterns. Many of these patterns are used today to coerce users into revealing too much personal information, Learn how to identify these patterns and avoid these traps.

    Presentation Level: MANAGERIAL (security and business leaders)

    9:30 am
    [OPENING KEYNOTE] Nation State Adversarial Action: Looking at the Criminal Cyber Space and the Nation State Actor Role Now and in the Future.
    • session level icon
    speaker photo
    Supervisory Special Agent, Cyber Crime Task Force , Federal Bureau of Investigation
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    The perennial cyber criminal threat has been ever present, as seen by large data breaches, ransomware attacks, and Darkmarkets. Nation States, however, have been much more subtle in both their tradecraft and goals to accomplish in cyberspace, what they have difficulty doing in the real world. This talk will discuss the FBI’s perspective on these threats, how investigations have shifted to meet new technological challenges, and the need for private/public partnerships to achieve positive outcomes.

    Presentation Level: GENERAL (InfoSec best practices, trends, solutions)

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:15 am
    Protect Your Herd from the Lion: Regulatory Expectations for Proactive Cybersecurity
    • session level icon
    speaker photo
    Partner, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    The lion will eventually attack the herd. Survival of the herd is, therefore, dependent on how well it prepares for the attack. The discussion of a data breach moved from “if” to “when” years ago. As a refection of this change, state and federal regulators have transitioned from merely defining breach response to also establishing fundamental safeguards for organizations to prevent or limit a breach. Through this presentation, we will analyze the varying state and federal definitions for “reasonable safeguards.” Our conversation will cover the breadth of proactive cybersecurity, including information use and disclosure, consumer rights, risk assessment, access controls, monitoring, and policy development.
    Presentation Level: MANAGERIAL (security and business leaders)

    11:15 am
    Data Mapping
    • session level icon
    Understanding How Your Data Moves Within and Without Your Organization
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    One essential component of health IT interoperability and improved care is the exchange of information. Data mapping plays a key role in not only moving data but also in understanding where and how the data moves.

    11:15 am
    The Anatomy of a Hack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    This presentation will introduce you to the dark side of hacking. We’ll take you through the thought process, the preparation and the actual efforts that a true Black Hat hacker undertakes to compromise your systems. Once you are able to think like a Black Hat, then you can better defend your environment from a Black Hat.
    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm

    This session is for Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    [Panel] Emerging Threats – Hackers and Exploits and Phishing Attacks! Oh My!
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    We all have heard email is the #1 attack vector. Based on the numbers we are seeing; it is pretty indisputable. But what about the other stuff? Zero Day exploits still make headlines. New ransomware attacks every week. IoT devices are easily hacked. BEC/CEO fraud attacks are at an all time high. Will AI be a tool for the hackers? Join our panelists as they share knowledge on the current threatscape and make some predictions on what is coming soon to a network near you.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    Lessons Learned from Recent Data Breaches
    • session level icon
    10 Critical Steps to Reduce Your Organization’s Risk of Becoming the Next Data Breach Victim
    speaker photo
    Principal, Fey LLC
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Huge data breaches continue to make headlines. Billions of personal data records were breached last year, and billions will be breached this year. In this presentation, Laura Clark Fey, one of the first 27 U.S. attorneys recognized as Privacy Law Specialists (IAPP) and Principal of Fey LLC, a global data privacy and information governance law firm, will discuss data breaches highlighted in the news. For each data breach, she will provide information about the personal data that was breached; discuss causes of the breach; address the consequences for the entity that was breached; and provide key lessons to take away from each breach. She will conclude her presentation by providing 10 critical steps organizations can take to lower their risks of becoming the next data breach targets.

    Presentation Level: MANAGERIAL (security and business leaders)

     

    3:00 pm
    Panel: AI, Data Analytics, and Privacy
    • session level icon
    speaker photo
    President, American Cyber Security Management (ACSM)
    speaker photo
    Consulting Attorney, PBL Consulting
    speaker photo
    Attorney at Law, Polsinelli
    speaker photo
    Partner, Lathrop GPM LLP
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    As privacy regulations increase, both in the U.S. and internationally, the current requirements for automated processing are challenged. This panel will explore how GDPR, CCPA, and other regulations have impacted businesses’ use of Artificial Intelligence and Data Analytics. How will the use of Big Data evolve? What is the impact to the user of these systems? What are the business impacts?
    Presentation Level: MANAGERIAL (security and business leaders)

     

    3:00 pm
    Make the Move from InfoSec Technician to InfoSec Leadership
    • session level icon
    speaker photo
    VP of Information Security, Veterans United Home Loans
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    Are you a technician feeling the call towards leadership? Are you just interested in learning more about leadership? Just being a good tech is no guarantee of being a good leader. There are many things that good leaders need to know that have nothing to do with technical knowledge.

    Come to this session and join in a conversation about the path from the Information Security Technical role to an Information Security Leadership role. Learn the right Knowledge that will be Powerful in helping you become a great Information Security Leader!
    Presentation Level: MANAGERIAL (security and business leaders)

Exhibitors
  • Alert Logic
    Booth:

    Whether your company is transitioning infrastructure to the cloud, taking advantage of managed hosting services, or continuing to rely on owned data centers, Alert Logic offers intrusion detection, vulnerability assessment and log management solutions that are coupled with 24/7 monitoring and expert guidance services from our security operations center. More than 1,500 enterprise customers trust Alert Logic to secure and protect their digital information, and rely on us for keeping in step with increasingly complex regulatory issues. In addition to our team of GIAC analysts dedicated to careful observation and assessment of threats to your data, our research team stays on top of emerging developments so we can stop potential security breaches before they strike. We also have a dedicated support team ready to answer any questions you have about our products and services.

  • Armis, Inc
    Booth:

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Corelight
    Booth:

    Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com 

  • EC-Council
    Booth:

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Global Cyber Alliance
    Booth:

    The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org

  • GuidePoint Security LLC
    Booth:

    GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com

  • IAPP
    Booth:

    Your Comprehensive global information privacy community and resource. Data powers the information economy. And the risks associated with it continue to skyrocket. Data breach, identity theft, loss of customer trust—these are the threats to organizations of all sizes, in all sectors, in today’s marketplace.

    The International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data. In fact, we’re the world’s largest and most comprehensive global information privacy community.

    The IAPP is the only place that brings together the people, tools and global information management practices you need to thrive in today’s rapidly evolving information economy.

  • InfraGard Kansas City
    Booth:

    InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.

    The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.

  • ISACA Kansas City
    Booth:

    Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.

  • (ISC)2 Kansas City Chapter
    Booth:

    The mission of (ISC)² Kansas City (KC) Chapter is to advance the Information Security Profession by leveraging our shared body of knowledge to better our communities, groom the next generation of security professionals by delivering solutions to real-world security problems and issues that our members face.

    “We” began as a few security-minded friends that worked together.  We decided to quit talking about launching a local (ISC)² chapter in Kansas City or worse yet, wait around for someone else to do it for us.  We stepped up and took the initiative.  We have been growing as others hear about our group and join with us.

  • ISSA Central Plains Chapter
    Booth:

    The Information Systems Security Association (ISSA) ® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members.
    MEETINGS
    General Meetings are held monthly on the first Friday of the month. These meetings may have some type of formal presentation. In the absense of a presentation, the meeting will focus on a roundtable discussion based on the 8 domains of the CISSP CBK.

    Location: Friends University Business & Technology Bld 
    Corner of Hiram & Maple, Wichita, KS 67213
  • ISSA Kansas City
    Booth:

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

  • Kansas City ECTF
    Booth:

    The USSS ECTF aims to increase the resources, skills and vision by which state, local, and federal law enforcement agencies team with prosecutors, private industry and academia to fully maximize what each has to offer in an effort to combat criminal activity. The common purpose is the prevention, detection, mitigation, and aggressive investigation of attacks on the nation’s financial and critical infrastructures.

  • KC Tech Council
    Booth:

    The KC Tech Council represents Kansas City’s tech industry, a diverse ecosystem anchored by multinational corporations and driven by innovative entrepreneurs, with industry footholds in Healthcare IT, Telecommunications, Digital Media, and more.

    In conjunction with strategic partners, active stakeholders and unique cultural and lifestyle advantages, the KC Tech Council elevates Kansas City as a leading technology hub.

    The KC Tech Council’s work helps to attract, retain and grow technology companies and highly skilled tech talent in Kansas City, ensuring the sustained competitiveness of our region into the future.

    The KC Tech Council is the operator of ChuteKC.com, an online-portal for tech candidates and employers to connect.

  • KU – Edwards Campus
    Booth:

    The University of Kansas holds a tradition of excellence over a century old. In the 1970s, it shared that tradition with Greater Kansas City by providing courses to working professionals. In 1993 the university opened another location, the KU Edwards Campus, to provide permanent growth and education in the Kansas City community. In the past two decades, it has contributed more than $400 million to the Johnson County economy. In 2008, the Edwards Campus became proud partners in the Johnson County Education Research Triangle.

  • Okta
    Booth:

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • SecKC
    Booth:

    For those of you in Kansas City who find yourselves doing information security work as part of the day-to-day (be it consulting, penetration testing, internal compliance or just being the netadmin or sysadmin that has to mind the patches, firewalls and whatnot), I suggest trying to make it to SecKC.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Women in Security – Kansas City
    Booth:

    Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.

  • Women in CyberSecurity (WiCyS)
    Booth:

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Daniel Shoemaker
    Professor & Sr. Research Scientist, University of Detroit Mercy

    Dan Shoemaker is Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy. He has written eleven books and hundreds of articles in the field. He has been the Principal Investigator for the National Security Agency Center of Excellence at UDM, as well as the Chair of Workforce Training and Education for the Software Assurance Initiative at the Department of Homeland Security. He was a subject matter expert (SME) for the NIST National Initiative for Cybersecurity Education (NICE) Workforce Framework (NICE v1.0 and v2.0) and also the ACM/IEEE CSEC2017 Standard.

  • speaker photo
    Myles Kellerman
    Chief Cybersecurity Analyst, Alpine Security

    Myles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many of Alpine Security’s assessment and testing services and he is one of the highly skilled instructors who regularly provides training for public and private courses. Myles has a multifaceted skill set combining his military experience with his professional cybersecurity expertise. When he is not working Myles is an avid outdoorsman who enjoys spending time with his family and exploring history.

  • speaker photo
    Craig Reeds
    Cybersecurity Compliance Manager, Electric Power Systems International

    Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Compliance Senior Consultant he helps to protect the North American Power Grid. Craig hold both a CISSP and the CRISC certifications as well as degrees a BS in Information Systems from Maryville and an MBA from Webster University.

  • speaker photo
    Bruce Sussman
    Director of Media & Content, Podcast Host, SecureWorld

    Emmy-winning journalist Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. During his "second career," he became fascinated by cybersecurity while working with CISOs at Gartner. He joined SecureWorld in 2017 to help grow its media division. Currently, he hosts the Remote Sessions daily web conference series and SecureWorld podcast published each Tuesday, and oversees news content for secureworldexpo.com. Sussman graduated from the University of Missouri School of Journalism back in the dark ages. Message him on LinkedIn if you'd like to connect!

  • speaker photo
    Carlin Dornbusch
    President, American Cyber Security Management (ACSM)

    Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of modern threats and emerging compliance. Carlin’s background in technology, security, operations, and management give him a well-balanced approach to solving business problems and maximizing Return on Investment. Having worked for some of the most rapidly growing technology and solutions companies in the world, Carlin and his teams have developed hundreds of business leading solutions including; digital transformation, workforce productivity, IT simplification, business automation, customer service, and market expansion. A consultative approach has been the mainstay of Carlin’s methodology ever since leaving corporate employment in 2006. Carlin’s focus on people, process, and technology allows him to improve operational efficiency and help businesses modernize their workplace. His methods and techniques are industry leading and high leveraged by Focused Clouds’ clientele. You can find Carlin as an active member in the Cloud Security Alliance (CSA), Information Systems Security Association (ISSA), and International Association of Privacy Professionals (IAPP) organizations in Colorado. He founded and oversees the ever expanding GDPR/Privacy MeetUp. Carlin also holds an active Certified Information Systems Security Professional (CISSP) certificate from ISC2.

  • speaker photo
    George Schultze
    Supervisory Special Agent, Cyber Crime Task Force , Federal Bureau of Investigation

    Special Agent George Schultzel entered on duty in July of 2010 and was assigned to the New York Field Office. Over the course of his career, SA Schultzel has investigated complex criminal computer intrusions, nation state adversarial action, and cyber terrorism. SA Schultzel is currently serving as the Supervisory Special Agent of the Cyber Crime Task Force in the Kansas City Field Office.

  • speaker photo
    Stacy Harper
    Partner, Spencer Fane LLP

    Stacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and implement cybersecurity plans to comply with HIPAA, HITECH, GLBA, and various state law requirements.

  • speaker photo
    Laura Fey
    Principal, Fey LLC

    Laura Clark Fey, Esq., PLS, CIPP/US, CIPP/E, CIPM, FIP: Laura Clark Fey, one of the first twenty-seven U.S. attorneys recognized as Privacy Law Specialists by the International Association of Privacy Professionals (IAPP) (ABA-accredited), leads Fey LLC, a global data privacy and information governance law firm. She and her team help organizations develop and implement practical solutions to their unique data privacy and information governance challenges. Laura is a member of the inaugural class of IAPP Fellows of Information Privacy (FIP), a Certified U.S. and European Information Privacy Professional (CIPP/US/E), and a Certified Information Privacy Manager (CIPM). The U.S. Department of Commerce and the European Commission have selected Laura as an arbitrator in connection with the EU-U.S. Privacy Shield Framework Binding Arbitration Program. Laura has been selected into Baylor Law School’s Brain Trust as a data privacy thought leader for its LLM in Litigation Management Program. She teaches Global Data Protection and Privacy Law at the University of Kansas School of Law.

  • speaker photo
    Carlin Dornbusch
    President, American Cyber Security Management (ACSM)

    Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of modern threats and emerging compliance. Carlin’s background in technology, security, operations, and management give him a well-balanced approach to solving business problems and maximizing Return on Investment. Having worked for some of the most rapidly growing technology and solutions companies in the world, Carlin and his teams have developed hundreds of business leading solutions including; digital transformation, workforce productivity, IT simplification, business automation, customer service, and market expansion. A consultative approach has been the mainstay of Carlin’s methodology ever since leaving corporate employment in 2006. Carlin’s focus on people, process, and technology allows him to improve operational efficiency and help businesses modernize their workplace. His methods and techniques are industry leading and high leveraged by Focused Clouds’ clientele. You can find Carlin as an active member in the Cloud Security Alliance (CSA), Information Systems Security Association (ISSA), and International Association of Privacy Professionals (IAPP) organizations in Colorado. He founded and oversees the ever expanding GDPR/Privacy MeetUp. Carlin also holds an active Certified Information Systems Security Professional (CISSP) certificate from ISC2.

  • speaker photo
    Nan L. Grube
    Consulting Attorney, PBL Consulting

    Owner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandable terms the laws, regulations, and solutions. Her passion for excellence and efficiency in the litigation management space is exemplified by her recent completion of a Master in the Laws (an advanced law degree) in Litigation Management from Baylor University--a first in the nation curriculum to focus on innovative and systematic approaches for lowering and controlling litigation costs and deliver successful outcomes. Her thesis, Data Analytics and Artificial Intelligence in Early Case Assessment for Enhanced Client Value, brings together her passion for the leading technology, value additive processes, and privacy regulations. When not on her quest to be a life-long learner, she enjoys Glamping in her retro teardrop trailer with her two dogs, photographing the beauty around us, and visiting with her adult children (and beginning in June, a new grandbaby!)

  • speaker photo
    Steve Hengeli
    Attorney at Law, Polsinelli

    With a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technology. Steve is a Certified Information Privacy Professional for Europe (CIPP/E) and the United States (CIPP/US).

  • speaker photo
    Tedrick Housh
    Partner, Lathrop GPM LLP

    Tedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the Terms of Use and Privacy Policies needed for websites and apps. He helps clients navigate issues of data subject consent, and negotiates data vendor and transfer agreements. He is a co-leader of the firm’s Disruptive Technologies group, dealing with the legal and practical issues associated with Artificial Intelligence, Blockchain and other emerging tech platforms. In addition, Tedrick has two decades of experience in workplace law and commercial litigation.

  • speaker photo
    Randy Raw
    VP of Information Security, Veterans United Home Loans

    Randy Raw is VP of Information Security, serving as the Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store