googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 23, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, April 24, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This roundtable discussion is for our Advisory Council members only.

    9:00 am
    [Opening Keynote] Security Trepanation
    • session level icon
    Exploring the History of Security Bad Best Practices
    speaker photo
    CISO, Dolby Laboratories
    speaker photo
    CISO, i3 Verticals
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    CISOs are tasked with securing a spiraling business whirlwind that can change direction at any moment. However, the current overarching Business Strategy rarely takes security under consideration, can’t articulate their desired Security Risk posture and Security operational model, and doesn’t really know what they want from their CISOs. CISOs, on the other hand, struggle to articulate security threats and risks in business terms and to align the security practice with the business strategy.

    CISOs know full well that everything they do will be heavily scrutinized, and ultimately, they will pay the price for things that are not necessarily under their control.  To that end, many take the approach of checking compliance boxes and following “Best Practice,” and while this approach may provide a blanket to cover one’s backside, it is an ineffective practice. 

    In this session, Yaron Levi and Neil Watkins will challenge conventional thinking and the notion of “following best practices” and will propose a shift in mindset that moves away from best practice, compliance-driven approaches towards a more proactive and strategic approach to security.  This involves reimagining how security is practiced within organizations and prioritizing initiatives that directly contribute to building a defensible security strategy. 

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    SOC Essentials: Assembling Your First Response Team
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    The Security Operations Center (SOC) is an organization’s first eyes and ears to security threats and risks. For the SOC to support being an organization’s first response team, the team must have the proper resources for continuous growth and monitoring to keep an organization secure. This discussion focuses on key foundational elements for developing and maturing a SOC. Attendees will learn how to establish processes, procedures, and growth plans for their SOC. Additionally, use metrics to show maturity opportunities within a SOC and identify cyber security risks in a business.

    10:15 am
    Navigating the Regulatory Landscape: Impact of New SEC Regulations on Cybersecurity Leadership
    • session level icon
    speaker photo
    SVP, CISO & CPO, UMB Bank
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    The introduction of new SEC regulations has reshaped the terrain for CISOs. This session brings together seasoned cybersecurity leaders to dissect the intricacies of these new regulatory measures and delve into their profound effects on CISOs and their teams. Topics to cover include compliance challenges, reporting and transparency, personal and professional liability risk management, resource allocation, collaboration with legal and compliance teams, impact on incident response, and strategic planning for resilience. Gain actionable insights to steer your cybersecurity strategy in compliance with the new SEC regulations.

    10:15 am
    Mind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-Patch
    • session level icon
    speaker photo
    Technical Director, Skybox Security
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to the importance of the asset or its exposure to potential attack across the network.

    To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.

    In this session, you will learn:

    • How the visibility of your assets, networks, business, and security data impacts vulnerability risk.
    • What scanners miss in discovery and prioritization, and how to fill in the gaps.
    • How to reduce the scan-and-patch lag from weeks to hours.

    Join Dr. Howard Goodman as he explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Why Technical and Executive Leadership Is Needed to Effectively Manage Cyber Risk
    • session level icon
    speaker photo
    Sr. Manager, Internal Audit, Spirit AeroSystems
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Session description coming soon.

    11:10 am
    Securing the Ballot Box: Safeguarding Election Infrastructure Against Cyber Threats
    • session level icon
    speaker photo
    Chief of Cybersecurity, Region 7, DHS CISA
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    The Cybersecurity and Infrastructure Security Agency (CISA) observes trends of internet-accessible vulnerability exposures to Election Infrastructure (EI) entities’ networks that present opportunities for threat actors to employ malicious tactics, techniques, and procedures (TTPs) leveraged in past incidents. CISA and the Federal Bureau of Investigation (FBI) released a joint announcement which indicated that voter registration information continues to be a target of interest for malicious threat actors. CISA defines cyber risk as the likelihood that a threat actor will exploit a vulnerability to cause harm to EI Subsector entities. Continued exposure to known vulnerabilities or weaknesses almost certainly increases an entity’s risk of compromise and adverse consequences for critical functions.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Solutions Engineer, Perception Point
    speaker photo
    Sr. Solutions Engineer, Rapid7
    speaker photo
    Award-Winning Safety Speaker and Writer
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] Building Cyber Resilience Through Leadership and the Power of Perspective
    • session level icon
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session description coming soon.

    12:00 pm
    Advisory Council Lunch Roundtable (VIP / Invite Only)
    • session level icon
    The Intersection of Physical and Cyber Security Through the FBI Lens
    speaker photo
    Special Agent, Kansas City Division, FBI
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Safeguarding Your Organization's Digital Presence Against Advanced Cyber Threats
    • session level icon
    speaker photo
    TEDx and Cybersecurity Technology Speaker
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    As guardians of your organization’s cybersecurity strategy, the responsibility to fortify social media accounts and websites against evolving cyber threats rests squarely on the shoulders of cybersecurity leaders. Join us for an exclusive session designed to equip you with the insights and strategies necessary to secure digital platforms effectively.
    1:15 pm
    Measuring Cybersecurity Program Maturity
    • session level icon
    speaker photo
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District
    speaker photo
    Assistant Director of Technology Services, City of Independence, Missouri
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    This breakout is targeted to practitioners and front line leaders focused on understanding cybersecurity program maturity models, evaluating your own program, building improvement strategies, and measuring progress.
    1:15 pm
    [Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial Intelligence
    • session level icon
    speaker photo
    Staff Solutions Engineer, Snyk
    speaker photo
    Solutions Engineer, Okta
    speaker photo
    Global BISO & Director of Business Partnership, Cardinal Health
    speaker photo
    CISO, Dolby Laboratories
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Building a Skills-Based Hiring Model for the Future
    • session level icon
    speaker photo
    Executive Director, CyberUp
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Developing a strong pipeline of cybersecurity talent is critical for organizations seeking to protect themselves in an increasingly complex threat landscape. This session will explore innovative approaches to building a skilled, diverse cybersecurity workforce including through education pathways, upskilling programs, apprenticeships, diversity initiatives, and public-private partnerships.
    2:10 pm
    Conquering the Past: Strategies for Overcoming Technical Debt in IT and Cybersecurity
    • session level icon
    speaker photo
    Director of Cybersecurity, Avelo Airlines
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    This presentation tackles the challenge of overcoming technical debt in IT and cybersecurity, defined as outdated or underinvested technology and infrastructure. It offers leaders practical strategies to update and enhance their technological assets. The talk covers the causes, impacts, and risks of technical debt and provides systematic approaches for its identification, assessment, and prioritization. Actionable steps for addressing technical debt will be shared, focusing on resource allocation, technology selection, and fostering a culture of continuous improvement. This is vital for professionals aiming to improve their cybersecurity posture and IT efficiency, leading to a more secure and future-proof organization.
    Learn to identify and assess technical debt in IT and cybersecurity, implement strategic remediation approaches, including resource allocation and technology selection, and foster a culture of continuous improvement to update infrastructure and align with industry standards regularly.
    2:10 pm
    Leading Across the Generations in Cybersecurity
    • session level icon
    speaker photo
    CISO, Veterans United Home Loans
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Leadership is hard. Leadership in Cybersecurity is harder. Have you ever thought this or wondered if it was true? There are many reasons it might be true, but one certain reason is that we have 4 generations of workers in the Cybersecurity industry right now. And, the way we lead those in the older generations probably looks nothing like how we should be leading the youngest generation!  In this session we will talk about those generational differences and dive into some proven, successful tactics on how to effectively lead your entire team, no matter how many generations you have represented.

    2:10 pm
    WiCyS Kansas City and ISSA Joint Chapter Meeting
    • session level icon
    Ransomware Network Cyber Resilience: Securing the Kill Chain
    speaker photo
    WiCys Kansas City Metroplex, President
    speaker photo
    President, ISSA KC Chapter
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Courtyard 6
    Ransomware has become a widespread threat to organizations worldwide, causing significant financial losses and operational disruptions. This session addresses the critical issue of enhancing ransomware resilience by focusing on securing the Lockheed Martin Cyber Kill Chain. The presentation provides essential strategies for organizations to secure their defenses against ransomware attacks, emphasizing the importance of proactive measures and effective incident response. Key topics include the role of backups, incident recovery, and the necessity of educating employees about phishing and password security.
    The presentation highlights the effectiveness of implementing a multi-layered security approach, which includes regular security awareness training, robust access controls, and advanced threat detection systems.
    Looking ahead, the presentation explores the emerging threat of AI-driven ransomware attacks. Attendees will gain valuable knowledge and actionable recommendations to improve their organization’s ransomware resilience.
    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote] From the Inside Out: Counterintelligence in the Age of Advanced Threats
    • session level icon
    speaker photo
    Senior Counterintelligence Officer (SCIO), Kansas City National Security Campus
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    Nation-state actors are increasingly engaged in diverse campaigns to infiltrate public and private entities to further nation-state goals and interests. Economic espionage, theft of intellectual property, and other forms of sabotage can have devastating consequences for a company’s bottom line and competitive position. Leaders should look beyond traditional defensive measures to address these evolving and persistent threats. Implementing a Multi-Discipline Counterintelligence (MDCI) approach to supplement traditional security techniques should be incorporated to best inform corporate risk-based decisions. This discussion will center around the application of MDCI in a corporate setting, with some discussion on recent threats and campaigns.

Exhibitors
  • Blumira
    Booth: 120

    Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.

    Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

  • C1 + Palo Alto Networks
    Booth: 240

    C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • InfraGard Kansas City
    Booth: TBD

    InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.

    The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.

  • ISACA Kansas City
    Booth: TBD

    Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.

  • ISSA Kansas City
    Booth: TBD

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

  • Keysight
    Booth: 160

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Myriad360
    Booth: 110

    Technology holds infinite potential for your business. And we’re here to unlock it.

    As a global systems integrator, Myriad360 strives to go beyond being a service provider, vendor, or consultant. We will become an extension of your team and your strategic ally in the relentless pursuit of technological advancement.

    The world is changing rapidly, with advancements in cloud services, AI solutions, cybersecurity, hardware procurement, and data center modernization. At Myriad360, we offer the expertise you need to drive innovation in your business at unparalleled speeds.

    Our clients include industry pioneers, marketplace game-changers, and technology visionaries. They are the doers, the creators, the innovators. They chose Myriad360 because they needed a world-class partner to transform their ideas into reality on a global scale.

  • Okta
    Booth: 230

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Perception Point
    Booth: 220

    Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organization’s main attack vectors – email, web browsers, and cloud collaboration apps. The solution’s natively integrated and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations.

    Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems to prevent phishing, BEC, spam, malware, zero-days, ATO, and other advanced attacks well before they reach end-users. Fortune 500 enterprises and organizations across the globe are preventing attacks across their email, web browsers and cloud collaboration channels with Perception Point.

    Our unique technology which uses 7 advanced detection layers to provide a single verdict in just seconds, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves hundreds of global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, Finance, Insurance and more.

  • Rapid7
    Booth: 260

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Skybox Security
    Booth: 270

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Snyk
    Booth: 170

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • WiCyS Kansas City Affiliate
    Booth: TBD

    We are the Kansas City Metroplex affiliate of WiCyS serving 14 counties across Kansas and Missouri.

    Women in Security (WiCyS) helps build a strong cybersecurity workforce with gender equality by facilitating recruitment, retention and advancement for women in the field. WiCyS offers mentoring, training programs, scholarships, virtual and in-person conferences, leadership series, career fairs, webinars, and more to women at all stages of their cybersecurity career journey!

    Women in Cyber Security (WiCyS) is the premier organization with national reach dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking and mentoring. WiCyS is a non-profit organization offering many membership, sponsorship and collaboration benefits.

    As a member of WiCyS, you have access to all the resources and opportunities provided by our network. From community groups to career fairs, scholarships to speaking opportunities, and much more, we’re here to support your growth in the field of cybersecurity.

    WiCyS is the only non-profit membership organization with global reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.

    Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.

  • Women in Security – Kansas City
    Booth: TBD

    Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Yaron Levi
    CISO, Dolby Laboratories

    Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a Research Fellow for the Cloud Security Alliance, serves as an advisory board member for several information security companies, and is co-founder of the Kansas City CISO forum. He graduated from the FBI CISO academy in 2018, and currently serves on the board of InfraGard KC.

  • speaker photo
    Neil Watkins
    CISO, i3 Verticals
  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Justin Rainey
    SVP, CISO & CPO, UMB Bank

    Justin Rainey serves as Chief Information Security Officer and Chief Privacy Officer at UMB Financial Corporation. In this role, he is responsible for establishing strategy and overseeing implementation of an effective, integrated, and proactive information security and privacy program. He is also responsible for advising and partnering with leadership to guide the management of emerging and actual cybersecurity, business continuity and resilience, physical information security, data privacy, third party and information governance risks.

  • speaker photo
    Jessie Gibbons
    Technical Director, Skybox Security
  • speaker photo
    Brian Howell
    Sr. Manager, Internal Audit, Spirit AeroSystems

    Brian is a business and technology risk advisor with nearly 25 years of experience in various risk management, audit and business process functions. In his current role at Spirit, he serves as a Senior Manager within the Internal Audit group focused on operational and IT audits.

    He is a member of both the IIA and ISACA and is a Certified Information Systems Auditor certification.

  • speaker photo
    Geoff Jenista
    Chief of Cybersecurity, Region 7, DHS CISA

    Mr. Jenista serves as the Regional Cyber Security Advisor for Region VII (IA, KS, MO and NE) for the Cybersecurity & Infrastructure Security Agency (CISA), Integrated Operations Division. Based in Kansas City, KS, he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure.

    His programs coordinate cyber preparedness, risk mitigation and incident response. He provides Cyber Security resource briefings, Cyber Security assessments, and Incident Response planning to the nation’s 16 critical infrastructure sectors and state, local, tribal, and territorial government entities.

    Prior to joining the Department of Homeland Security Mr. Jenista worked for 12 years with U.S. Army as an Army Enterprise Systems Branch Chief and Information Systems Security Manager with responsibility for all aspects of Technical support, Service Delivery, Risk Management, Project Management, Enterprise Architecture and Information Security. Prior to joining the U.S. Army, he served 22 years in the U.S. Navy as a Senior Chief Petty Officer, holding duties as an Executive Officer, Weapons Officer and AEGIS Maintenance Supervisor.

    Mr. Jenista holds a MBA and an MA in Information Technology Management from Webster University. He has a BS in Computer Information Systems from Park University and he holds the Certified Information System Security Professional (CISSP) certification.

  • speaker photo
    Rosko (Ronald) Goings
    Solutions Engineer, Perception Point

    Rosko brings with him a diverse background in IT security and compliance. He has worked in a wide array of technical roles including Technical Support, Network Security, Solution Engineer, as well as Customer Success. Throughout all of his experiences, Rosko has dealt with a number of regulatory and compliance organizations. In his current role, he uses this knowledge to help protect organizations, not only from malware and cyber attacks, but the effects those attacks pose to a company’s customers, brand, and reputation.

  • speaker photo
    Quinten Sepe
    Sr. Solutions Engineer, Rapid7
  • speaker photo
    Tracey 'The Safety Lady' Hawkins, Moderator
    Award-Winning Safety Speaker and Writer

    Tracey Hawkins, aka “Tracey, the Safety Lady,” is a leading safety and security expert. She’s a powerhouse speaker, writer, trainer, and international content creator who has created and delivered safety and security programs, in-person and virtually, since 1995. She hosts the new "Drive with NAR: The Safety Series" podcast, which debuted in July 2023. She has written for several general publications about safety and security topics.

    She’s a sought-after speaker who has rocked the stage of several national conferences and for organizations, including American Airlines, H&R Block, Sprint, Waddell & Reed, United Way, the National Association of REALTORS(R), National Archives, The Missouri National Guard, etc. She speaks for associations, boards, companies, service organizations, and others nationwide.

    She’s a media expert featured on The Today Show, the Washington Post, The Boston Globe, CNNNews.com, Essence Magazine, and more.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Jarrod Forgues Schlenker, Moderator
    Special Agent, Kansas City Division, FBI

    Jarrod Forgues Schlenker is a Special Agent with the Kansas City Division of the FBI, investigating cybercriminal violations. Previously, he investigated violent crimes against children and human trafficking in Kansas City and worked as an Intelligence Analyst at FBI Headquarters in Washington, DC. Before joining the Bureau, he worked in the U.S. House of Representatives for the Speaker of the House and as an investigator for a family law firm representing children in custody disputes while attending Catholic University’s Columbus School of Law in the evenings. Special Agent Forgues Schlenker received his Masters in Cyber Security and Information Assurance in 2021, his J.D. in 2015, and has a Bachelors in Political Philosophy and Ethics from Brown University in 2010.

  • speaker photo
    Burton Kelso
    TEDx and Cybersecurity Technology Speaker
  • speaker photo
    Donna Gomez
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District

    Donna Gomez, CRISC, is the Security Risk and Compliance Analyst at Johnson County (KS) Park & Recreation District. Previously, Donna served as the Critical Infrastructure Protection Senior Manager and Risk Compliance Analyst for a municipally owned utility. Donna has been an information security professional since 1999, where she began documenting processes for IT and customer support staff, then training people to not click on suspicious attachments in emails. She served as Past President of the InfraGard Kansas City Members Alliance and is past President of the Greater Kansas City Chapter of ISACA. Donna serves on several of the Multi-State Information Sharing and Analysis Center (MS-ISAC) Working Groups including the Metrics Subcommittee, Security Awareness, and Business Resiliency. Donna also serves as a member of the MARC Cybersecurity Task Force and volunteers with the ISACA Foundation as a mentor and promote diversity and inclusion in the Cyber Risk and Audit profession. She is the Director of Membership & Recruitment for the Kansas City Metroplex for Women in Cybersecurity (WiCyS).

    She previously served as a member of the ASIS Professional Standards Board drafting team developing the Security Awareness Standard published in 2020. Her passion is to continue expanding the information sharing community and build partnerships to help strengthen the security resiliency and awareness of anyone responsible for protecting the critical infrastructure.

  • speaker photo
    Chris Johnson
    Assistant Director of Technology Services, City of Independence, Missouri

    Chris Johnson is currently serving as the Assistant Director of Technology Services for the City of Independence, Missouri. In this role he is responsible for strategy and execution of all technology needs for the various City departments. These functions include HelpDesk, deskside support, applications management, data center/server admin, network engineering, and cybersecurity. Chris also serves as the Region 7 (IA, KS, MO, NE) Director for ITDRC.org, a volunteer-driven international disaster response non-profit delivering Information, Communications, and Technology solutions to connect survivors and responders during both man-made and natural disaster response and recovery. Chris is a disabled veteran and completed a 17 year active duty Air Force career, followed by a role as the Senior Cybersecurity Engineer for a large USG customer, and four years in various roles leading Amazon Web Services (AWS) Data Center business in Northern Virginia. Chris also serves on the Mid-America Regional Council (MARC) Cybersecurity Committee, is a member of the Kansas City InfraGard Chapter, KC FAIR Chapter, Veterans of Foreign Wars (VFW), American Legion, and Disabled American Veterans (DAV).

  • speaker photo
    Joe Shope
    Staff Solutions Engineer, Snyk

    Joe Shope is a Staff Solutions Engineer for Snyk. They support Fortune 500 customers with modernizing AppSec practices and adopting a fix-based DevSecOps culture. With over a decade of cybersecurity experience, Joe has led programs ranging from Physical Security to Information Security, and from Vulnerability Management to Cloud Modernization. They grew up in Wichita, KS starting their career as a Cyber Systems Operations Specialist in the USAF before getting their degree in Network Operations and Security and moving into Solutions Engineering. Joe now lives in Kansas City with their partner and blended family of 5 kids.

  • speaker photo
    Armando Aguilar
    Solutions Engineer, Okta

    Armando is a Solutions Engineer whose expertise lies in developing comprehensive strategies that enable organizations to manage identity and access privileges efficiently while mitigating security risks around the Okta Identity Cloud. Armando has a deep understanding of industry best practices and a proven track record of successful implementations. He is a trusted advisor to businesses of all sizes looking to improve their security posture. Armando is known for his collaborative, innovative, and dedicated approach to delivering solutions that help organizations achieve their security and business objectives.

  • speaker photo
    Britney Kennedy
    Global BISO & Director of Business Partnership, Cardinal Health

    Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since transitioned to Cardinal Health, initially leading Cyber Operations and now performing as the Director of Information Security Business Partnerships, providing Business Support, Security Awareness, and Compliance Operations across the Globe. Britney is a certified CISSP, CISM, PMP, SSAP. and holds certifications for CompTIA S+, CCSK, and IT Business Management. She holds a BS in Applied & Discrete Mathematics and an MS in Cybersecurity. Britney was also named an IT Security Power Player by SC Magazine and named as the Security Professional of the Year by ASIS Kansas City Chapter in 2020.

  • speaker photo
    Yaron Levi, Moderator
    CISO, Dolby Laboratories

    Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a Research Fellow for the Cloud Security Alliance, serves as an advisory board member for several information security companies, and is co-founder of the Kansas City CISO forum. He graduated from the FBI CISO academy in 2018, and currently serves on the board of InfraGard KC.

  • speaker photo
    Tony Bryan
    Executive Director, CyberUp

    Tony, CyberUp’s Executive Director, has served the nonprofit community for more than 14 years. He spent nine years serving in the United States Army, where he was known as the youngest Military Police Sergeant in Brigade. Succeeding his time in the Military, Tony was appointed by the Governor of Missouri to serve on the Workforce Development Board and chosen to lead CyberUp. As the Executive Director of a nationally recognized organization, Tony remains passionate for growing apprenticeship opportunities to energize the country’s workforce. He was chosen to serve as the co-chair for the National Initiative for Cybersecurity Education (NICE) Apprenticeship Sub Working Group. Outside of work, you can see Tony adventuring outdoors or playing video games.

  • speaker photo
    David Sledge
    Director of Cybersecurity, Avelo Airlines

    David Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking engagements include keynote speaker and panelist. He is a current ISACA – Greater Houston Chapter Board Member and active member of SIM Houston, ISSA South Texas, OWASP Austin, and ISC2 Austin. A cybersecurity advisory board member at multiple universities and is recognized as an ambassador, mentor, and advocate in the cybersecurity industry.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Dr. Cheryl Cooper, CISSP
    WiCys Kansas City Metroplex, President

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.

  • speaker photo
    Naeem Babri
    President, ISSA KC Chapter

    Naeem Babri is a cybersecurity practitioner who works at T-Mobile, focusing on cyber risk assessments, information security, and cyber security controls. Naeem has worked in IT and cybersecurity for the last 20+ years. His expertise in information security, IT operations, and support has led to various roles at T-Mobile, formerly Sprint. His various Board services include serving as President and advisor of ISSA-KC since 2014, board member for InfraGard, and as an advisor for various conferences. Naeem is an avid runner, enjoys photography, and is an arts patron in addition to his various community projects. He holds a Master's degree in Computer Resource Management and a Bachelor of Science in Mathematics and Computer Science.

  • speaker photo
    Happy Hour
  • speaker photo
    Josh Vander Veen
    Senior Counterintelligence Officer (SCIO), Kansas City National Security Campus

    Josh Vander Veen has worked in the counterintelligence profession for over 20 years and currently directs the Counterintelligence division at the Kansas City National Security Campus (KCNSC). Josh previously worked Multi-Discipline Counterintelligence (MDCI) activities within the Intelligence Community, and is a former U.S. Army CI Agent with deployments to Southwest and Southeast Asia. Josh received a Bachelor of Science in Technical Communication from Arizona State University and a Master’s Degree in Information Systems from the University of Arkansas.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Best practices & solutions, straight from the source

Join your local cybersecurity community for learning and professional growth!