Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 7, 20259:00 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous FutureSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO & Managing Director, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
9:00 am[PLUS Course] Master the Art of Cybersecurity StrategyBuild, Lead, Succeed: A Hands-On CISO Strategy WorkshopCISO, Dolby LaboratoriesCISO, i3 VerticalsFounder, WhatsNextBizRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmYou’ve landed the coveted Chief Information Security Officer (CISO) role—now what? The cornerstone of every CISO’s success is crafting a security strategy that aligns with their organization’s unique needs. But where do you begin?
Join seasoned CISOs Yaron Levi, Neil Watkins & Elizabeth Souder in an intensive, hands-on workshop designed to equip you with the tools and frameworks to build a cybersecurity strategy that works for your organization.
In this interactive session, you will:
- Define your organization’s risk appetite.
- Identify the controls and capabilities needed for robust cybersecurity.
- Develop a purpose-driven strategy with clear principles and priorities.
By the end of the day, you will have created an actionable cybersecurity strategy tailored to your organization. You will also present your strategy for expert feedback and collaborate with peers to refine your approach.
This workshop is designed for acting CISOs or experienced security practitioners who aspire to lead at the highest level.
Agenda:
- 9:00–10:00 AM: Strategy Fundamentals—Insights from the Experts
- 10:00–12:00 PM: Group Work—Building Your Strategy
- 12:00–1:00 PM: Lunch
- 1:00-3:00 PM: Strategy Presentations, Feedback, and Winner Announcement
Seats are limited—Reserve your spot now!
With only 20 participants (5 groups of 4), this workshop offers personalized attention and invaluable insights from experts. Don’t miss this opportunity to accelerate your career and strengthen your organization’s security posture. - Thursday, May 8, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amEnterprise KC Chapter Meeting: Long Ago, in the Heartland of Cybersecurity…Director, Heartland Cyber Range, EnterpriseKCRegistration Level:Open Sessions
8:00 am - 8:45 amEvery region has a cyber story—what’s yours? Join us for an interactive update on how Kansas and Missouri are rewriting the narrative around cybersecurity education, workforce development, and innovation. We’ll share the latest updates on the Heartland Cyber Range and EnterpriseKC’s broader efforts to cultivate talent and enhance the region’s cyber ecosystem. Along the way, we’ll highlight lessons learned, emerging trends, and ways the local cybersecurity community can help shape the future. Whether you’re a long-time supporter or just discovering this work, this is your invitation to be part of the story.8:00 amWiCyS and ISSA Joint Chapter Meeting (Open to all attendees)Once Upon a Breach: Defending the Kingdom of Critical Infrastructure from Ransomware SorceryPresident, WiCyS Kansas City MetroplexPresident, ISSA KC ChapterRegistration Level:Open Sessions
8:00 am - 8:45 amOnce upon a time, in a sprawling kingdom of Operational Technology (OT), a sinister threat loomed over its most vital domains. Cyber sorcerers, wielding the dark arts of ransomware spells, crept through the hidden passageways between IT and OT networks, seeking to ensnare control systems and disrupt critical infrastructure. The kingdom’s industrial fortresses, from energy grids to water treatment plants, faced relentless attacks. As these malevolent forces exploited vulnerabilities, defenders struggled to maintain their strongholds, uncovering the grim reality that IT-based security alone was insufficient to protect OT assets.
But fear not! A council of cybersecurity warriors and strategists has assembled, determined to break the ransomware curse and fortify the realm against future assaults. In this session, attendees whether battle-hardened OT defenders or strategic analysts will embark on an epic quest to:
🏰 DELIVERABLES – Your Cyber Quest Begins!
🔎 The Enchanted Risk Assessment Challenge – Step into the role of castle defenders as you uncover hidden vulnerabilities in a simulated OT environment.
📜 The Cyber Spellbook: Security Framework Checklist– A practical guide and framework filled with protective enchantments for organizations to strengthen their OT defenses and guard their kingdom’s most valuable assets.
⚔️ The Council of Guardians: Strategy Development & Group Discussion – Gather with fellow knights, sorcerers, and castle keepers to collaborate on battle tactics and exchange wisdom.
🛡️ Decode the interwoven fate of IT & OT– Understand the architectural weaknesses that cyber adversaries manipulate to infiltrate OT environments.
🔥 Examine emerging ransomware trends – Dive into the tactics, techniques, and procedures (TTPs) attackers use to evade detection and maximize their impact.
This cybersecurity fairytale is not merely about protecting a mythical castle, it’s about securing the foundations of modern civilization from increasingly sophisticated ransomware threats. Prepare to step into the battle for OT security, your fate as a cyber warrior awaits!
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] State of the Cyber Union: Kansas' Vision for the Future of CybersecurityCISO, State of KansasRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterAs the CISO for the State of Kansas, John Godfrey is at the helm of a transformative cybersecurity strategy that is reshaping how the state approaches critical infrastructure, threat intelligence, and public-private partnerships. In this keynote, John will provide an exclusive “State of the Cyber Union” address, outlining the key initiatives driving Kansas’ cybersecurity future. From implementing 14 new state cyber policies to advancing the state’s cyber framework with NIST CSF, John will share his vision for a more resilient digital landscape.
Attendees will gain insights into Kansas’ robust funding initiatives, including a large grant program aimed at boosting local cybersecurity programs and fostering collaboration across sectors. Additionally, John will discuss the state’s approach to threat intelligence sharing, external attack surface monitoring, and tabletop exercises to prepare for emerging threats. This session is a must-attend for anyone looking to understand the future of state-level cybersecurity and the bold steps Kansas is taking to stay ahead of the curve.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amIt Takes All of Us to #SecureOurWorld – Help CISA Reduce Risk to America's Digital InfrastructureDirector, Region 7, DHS CISARegistration Level:Conference Pass
10:15 am - 11:00 amWe need your help. Security experts with the Cybersecurity and Infrastructure Security Agency (CISA) are working to secure our nation’s cybersecurity, but we can’t do it alone. We need YOU to help us educate others, and we need everyone to take steps to help make themselves more secure online. That’s the purpose of the Secure Our World program. Secure Our World provides no-cost ways for individuals, businesses, and organizations to take the steps needed to reduce our collective cyber risk. Together we can secure America and secure our world.
10:15 amDeveloping Strategies and Governance Policies Around AIRegistration Level:Conference Pass
10:15 am - 11:00 amAs AI continues to revolutionize the business landscape, organizations face the critical challenge of harnessing its potential while mitigating associated risks. This panel session brings together experts from varying industries to explore the intricacies of developing comprehensive AI strategies and governance policies.
Our presenter(s) will delve into:
- The current state of AI adoption across various industries and its impact on cybersecurity
- Key components of an effective AI strategy, including alignment with business objectives and ethical considerations
- Designing governance frameworks that ensure responsible AI use while fostering innovation
- Addressing AI-specific risks, including bias, privacy concerns, and potential security vulnerabilities
- Regulatory landscape and compliance requirements for AI implementation
- Best practices for data management and protection in AI-driven environments
- Ethical considerations in AI development and deployment
- Strategies for building AI literacy within organizations
- Future trends and preparing for the evolving AI landscape
Gain valuable insights into creating balanced, forward-thinking AI strategies that maximize benefits while maintaining robust security and ethical standards. The session provides practical guidance on navigating the complex intersection of AI, business objectives, and regulatory requirements.
10:15 amRethinking Security for the Modern Enterprise: A Strategic Lens for Enterprise Security ProfessionalsSr. Solutions Architect, Cybersecurity, C1Registration Level:Open Sessions
10:15 am - 11:00 amAs digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.
We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.
Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.
Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amProtecting Your AI-Powered Chatbots Against New Attack TypesPrincipal Product Security Architect, BayerRegistration Level:Conference Pass
11:10 am - 11:55 amThis session discusses specific ways that many of these new tools that are used to power your organization’s AI-powered chatbots can easily lead to data leakage or reputational brand damage. We will also give a demonstration of exploiting a running chatbot and follow up with mitigation tactics, techniques, and patterns that you can apply.
Key take-away: Attendees will walk away with actionable steps that can be taken to help mitigate these attacks.
Presentation Level: TECHNICAL (deeper dive including TTPs)
11:10 amBuilding Trusted Partnerships to Enable Secure ProductsRegistration Level:Conference Pass
11:10 am - 11:55 amIn today’s interconnected digital ecosystem, the security of any product is only as strong as its weakest link. This panel session explores the critical role of trusted partnerships in developing and maintaining secure products throughout their lifecycle.
Our distinguished panel delves into the challenges and opportunities of fostering collaborative relationships between vendors, suppliers, and customers to enhance product security. They examine how these partnerships can lead to more robust security measures, improved threat intelligence sharing, and faster response times to emerging vulnerabilities. Key topics include:
- Establishing trust in the supply chain
- Collaborative approaches to secure software development
- The role of transparency in building and maintaining trust
- Balancing intellectual property concerns with security needs
- Leveraging partnerships for more effective incident response
- Case studies of successful security-focused partnerships
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceSenior Product Marketing Manager, AppOmniRegistration Level:Open Sessions
11:10 am - 11:55 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of ConflictCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThis informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.
Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.
He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmLeadership: The Cornerstone of Cybersecurity SuccessCISO, Veterans United Home LoansRegistration Level:Conference Pass
1:15 pm - 2:00 pmEach generation brings unique strengths, perspectives, and challenges. Leading a diverse, multigenerational team requires more than just understanding technology—it requires understanding people. The strategies that resonate with seasoned professionals likely differ from those that inspire the youngest members of your team.
When you also consider the impact of technology and the pace of change brought about by that technology, interesting trends and patterns emerge. As leaders better understand those trends and patterns, they lead their teams to be much higher performing. The ultimate result is happier, more productive employees, higher retention and better recruiting possibilities.
In this session, we’ll explore why leadership is the foundation of every successful cybersecurity initiative. We’ll also dive into the nuances of leading across generations, offering proven tactics to effectively manage, motivate, and unify your team. Discover how to harness the potential of every team.
1:15 pmCybersecurity Challenges for Small and Medium BusinessesRegistration Level:Open Sessions
1:15 pm - 2:00 pmSmall and medium businesses (SMBs) are the backbone of the U.S. economy, generating over half of the annual GDP and employing millions of Americans. But they also face unique cybersecurity challenges that can threaten their survival and growth. In this talk, learn how to assess and mitigate the cyber risks that SMBs face, and how to implement a robust cybersecurity program with limited resources and expertise.
We cover the following topics:
- The state of SMB cybersecurity in the U.S.
- The cost and impact of cyber breaches on SMBs
- The main cyber threats and vulnerabilities that SMBs face
- The best practices and frameworks for SMB cybersecurity
- The steps to build or improve your cybersecurity program
Whether you are an IT manager, a cybersecurity professional, or a business owner, this talk is informative and practical. Walk away with a better understanding of the cyber landscape and the tools and techniques to protect your SMB from cyberattacks.
1:15 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityRegistration Level:Open Sessions
1:15 pm - 2:00 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:00 pmNetworking BreakRegistration Level:Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmCyber Incident Response Planning—More Important than Ever BeforeSr. Systems Director, Cyber Security, Saint Francis Health SystemRegistration Level:Conference Pass
2:10 pm - 2:55 pmEven if you don’t have a best practice cybersecurity framework in place, you must have a best practice security incident response plan in place. The plan sets the tone at the top, it highlight framework gaps, and it utilizes tools such as training and table top exercises to help focus on priorities. It is whistleblowing without blowing the whistle.
A best practice cybersecurity incident response plan must be founded in recognized and accepted industry standards. Standards such as the U.S. National Institute of Standards and Technologies (NIST) 800–61R3 for incident response and the NIST 800–53 for cybersecurity best practice controls must be referenced. These two key NIST documents highlight the critical components required to build an institution’s best cybersecurity framework.
2:10 pmThe Sword in the Stone in Cyber: Forging a Resilient Workforce Talent PipelineManager, Strategic Cybersecurity & AI Product Owner, EnterpriseKCRegistration Level:Conference Pass
2:10 pm - 2:55 pmIn the timeless legend of King Arthur, the Sword in the Stone was more than just a mystical object—it symbolized destiny, potential, and the rightful passage of leadership. Just as Arthur was chosen for his unique qualities, today’s cybersecurity landscape demands an approach that identifies and nurtures emerging talent, ensuring that the next generation of cyber guardians is ready to lead with resilience and innovation.
This title parallels the magical act of drawing the sword and the strategic process of workforce talent pipeline development and training in cybersecurity. It emphasizes the following key ideas:
- Identifying the Right Talent
- Accelerated Skill Development
- Diverse Cyber Roles and Specializations
- Nurturing Emerging Leaders
- Ensuring Continuity and Resilience
- Empowering Through Transformation
“The Sword in the Stone of Succession Planning in Cyber” encapsulates the magic and imperative of strategic talent development across the full spectrum of cybersecurity roles. It serves as a call to action for organizations to invest in their most valuable asset—their people—ensuring that they are equipped, empowered, and ready to defend the digital realm now and in the future.
2:10 pm[Panel] Navigating the Cybersecurity Career Path: Perspectives from Entry-Level to Seasoned ProfessionalsBISO, RWEDirector, Information Security, Greater Kansas City Community Foundation | Greater HorizonsCOO, Tenfold Security, Board of Trustees, University of Saint MaryIT Support Analyst, Kansas Bureau of Investigation (KBI)Engineering Instructor, St. Teresa’s AcademySystems Trainer, Amusement Connect LLCSr. Engineer, Information Security & Risk, and Cybersecurity Awareness Lead, Cardinal Health; Principal, The STEM Broker, LLCRegistration Level:Conference Pass
2:10 pm - 2:55 pmIn this engaging fireside chat, we bring together a diverse group of women from across the cybersecurity industry to share their experiences and insights. The panel will feature three early-career women and three seasoned professionals, offering a unique blend of perspectives on navigating a career in cybersecurity, STEM, and IT.
From overcoming challenges and breaking into the industry to advancing to leadership roles, the conversation will explore the key milestones and pivotal moments in each stage of a cybersecurity career. Whether you’re just starting out or looking to level up, this session provides invaluable advice for women at every stage of their journey in the fast-paced and dynamic world of cybersecurity.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:Open Sessions
3:00 pm - 4:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in CybersecurityCISO, National Association of Insurance Commissioners (NAIC)Global BISO & Director of Business Partnership, Cardinal HealthCISO, Burns & McDonnellRegistration Level:Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterAs the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.
Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.
- AppOmniBooth: 230
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- C1Booth: 210
C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- CloudawareBooth: 270
Cloudaware LLC was founded in 2011.
Cloudaware provides a software-defined ITIL-based framework for digital infrastructure management. The world’s largest cloud consumers adopt our Integrated Cloud Service Management platform to streamline daily cloud operations.
Cloudaware has a strategic partnership with AWS, Microsoft Azure and Google Cloud. As the advanced technology partner, Cloudaware supports new services and features prior to general availability. We keep up with the rapidly innovating cloud industry by releasing new functionalities on a regular basis.
Cloudaware partners with New Relic and PagerDuty. By integrating our Asset Management and Resiliency Optimization with partner-enabled technologies, we help customers achieve operational excellence in modern self-service environments.
- CompylBooth: 290
Eliminate the need for multiple security tools, gain enterprise-level insights, and grow with a scalable GRC ecosystem. Compyl monitors and assigns workflows in a single location to ensure regulatory requirements and IT frameworks are continuously met by establishing a proper information security foundation across the entire organization.
- CyberhavenBooth: 220
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- Digital HandsBooth: 240
Digital Hands is how you finally get MDR with the flexibility, fine-tuning, and support needed to make it work in your specific environment. We call it Real-World MDR.
Too many companies get excited about the promise of MDR, only to be disappointed by MDR’s missing pieces. Where are the custom playbooks? The expert guidance? Firewall management? How do you handle the sheer volume of alerts? Why won’t this play nice with your tech stack? And on and on it goes. Meanwhile, the bad actors are becoming more and more sophisticated with AI and automation. So, you’ve got to think fast, act fast, and flex fast. That’s why organizations with some of the most sensitive data of all – such as hospitals, financial institutions, law firms, and government agencies – continue to give us industry-leading satisfaction sentiments year after year after year.
- EnterpriseKCBooth: TBD
EnterpriseKC is a business-led, systems driven, “think and do” tank focused on enterprise development, innovation, and job growth within high value, high opportunity industry clusters. We work directly with business, academia, and government to understand current cluster ecosystems and to advance strategies and programs that result in accelerated enterprise growth and economic prosperity throughout Kansas and Western Missouri.
- ExabeamBooth: 260
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- ExpelBooth: 180
Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.
- InfraGard Kansas CityBooth: TBD
InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.
The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.
- ISACA Kansas CityBooth: TBD
Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
- ISC2 Kansas City ChapterBooth: TBD
The mission of ISC2 Kansas City (KC) Chapter is to advance the Information Security Profession by leveraging our shared body of knowledge to better our communities, groom the next generation of security professionals by delivering solutions to real-world security problems and issues that our members face.
“We” began as a few security-minded friends that worked together. We decided to quit talking about launching a local ISC2 chapter in Kansas City or worse yet, wait around for someone else to do it for us. We stepped up and took the initiative. We have been growing as others hear about our group and join with us.
- ISSA Kansas CityBooth: TBD
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- Ping IdentityBooth: 170
Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.
- Tevora + ProcessUnityBooth: 190
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.
ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.
- ThreatLockerBooth: 200
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS Kansas City AffiliateBooth: TBD
We are the Kansas City Metroplex affiliate of WiCyS serving 14 counties across Kansas and Missouri.
Women in Security (WiCyS) helps build a strong cybersecurity workforce with gender equality by facilitating recruitment, retention and advancement for women in the field. WiCyS offers mentoring, training programs, scholarships, virtual and in-person conferences, leadership series, career fairs, webinars, and more to women at all stages of their cybersecurity career journey!
Women in Cyber Security (WiCyS) is the premier organization with national reach dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking and mentoring. WiCyS is a non-profit organization offering many membership, sponsorship and collaboration benefits.
As a member of WiCyS, you have access to all the resources and opportunities provided by our network. From community groups to career fairs, scholarships to speaking opportunities, and much more, we’re here to support your growth in the field of cybersecurity.
WiCyS is the only non-profit membership organization with global reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.
- Women in Security – Kansas CityBooth: TBD
Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.
- ZluriBooth: 280
Next-Gen Identity Governance & Administration platform for IT & Security teams to discover identities & applications, streamline access management, and automate access reviews in one single place
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Glen Sorensen, InstructorvCISO & Managing Director, Cyber Risk Opportunities LLC
Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.
- Yaron Levi, InstructorCISO, Dolby Laboratories
Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a Research Fellow for the Cloud Security Alliance, serves as an advisory board member for several information security companies, and is co-founder of the Kansas City CISO forum. He graduated from the FBI CISO academy in 2018, and currently serves on the board of InfraGard KC.
- Neil Watkins, InstructorCISO, i3 Verticals
- Elizabeth Souder, InstructorFounder, WhatsNextBiz
As a classically trained attorney, Elizabeth advises and consults with leaders and teams to realign the disconnect between their stated values and goals and the operations and behaviors that represent them in the real world. She has guided some of Kansas City’s leading organizations through launching, preparing for growth and expansion, addressing COVID-19 and post-COVID challenges, reimagining their identity, restructuring operations, and rebuilding workplace culture.
She thrives on working with leaders, new managers, and their teams to build teamwork, align and operationalize core values, empower each other, and achieve collective success.
With over 20 years of experience as a corporate lawyer for some of Kansas City’s largest employers, she has seen firsthand how organizational health and alignment directly impact success. Her background as a collegiate and lifelong athlete underscores the vital connection between health and performance. Translating these principles into a business context revealed that an intentional commitment to core values, aligned with strategic goals, informs every decision and action of effective leaders and thriving organizations.
She founded What’s Next Biz to foster happier and healthier workplaces by bridging the gap between legal obligations and business operations & culture. This comprehensive approach emphasizes the importance of each step in a business’s journey, not just the end goal. As John Wooden famously announced to each of his freshman basketball players, "winning championships begins with learning how to tie your shoe laces."
- Dr. Chuck GardnerDirector, Heartland Cyber Range, EnterpriseKC
Dr. Gardner is the Director of the Heartland Cyber Range at EnterpriseKC. Chuck develops a curriculum that provides an immersive cybersecurity learning experience, equipping learners with real-world defense skills and research capabilities. He plays a key role in identifying and nurturing high-potential cyber talent across the region.
Before joining EnterpriseKC, Chuck spent a decade in K-12 education, followed by nine years at CYBER.ORG, where he developed a national cybersecurity curriculum and supported educators, school districts, state departments of education, and regional and federal partners in building cybersecurity capacity. Since 2016, he has also led a landmark initiative with Virginia’s Department for the Blind and Vision Impaired, delivering accessible cybersecurity education to more than 120 students statewide.
- Dr. Cheryl Cooper, CISSPPresident, WiCyS Kansas City Metroplex
Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.
- Naeem BabriPresident, ISSA KC Chapter
Naeem Babri is a cybersecurity practitioner who works at T-Mobile, focusing on cyber risk assessments, information security, and cyber security controls. Naeem has worked in IT and cybersecurity for the last 20+ years. His expertise in information security, IT operations, and support has led to various roles at T-Mobile, formerly Sprint. His various Board services include serving as President and advisor of ISSA-KC since 2014, board member for InfraGard, and as an advisor for various conferences. Naeem is an avid runner, enjoys photography, and is an arts patron in addition to his various community projects. He holds a Master's degree in Computer Resource Management and a Bachelor of Science in Mathematics and Computer Science.
- John GodfreyCISO, State of Kansas
- Phil KirkDirector, Region 7, DHS CISA
Phil Kirk is the Region 7 Director for the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. Department of Homeland Security (DHS). Region 7 is headquartered in Kansas City, Missouri, and serves the states of Iowa, Kansas, Missouri and Nebraska. CISA is the Nation’s risk advisor, working with partners to defend against today’s digital and physical threats and collaborating to build more secure and resilient infrastructure for the future.
Through leadership and management of field-based resources and capabilities, Regional Directors guide all of CISA’s numerous and varied programs. Mr. Kirk was selected as Regional Director of the Office of Infrastructure Protection in the National Protection and Programs Directorate (NPPD) of DHS in 2016, prior to the creation of CISA through the Cyber Security and Infrastructure Security Act of 2018. He then served as the Acting Director of CISA Region 7 for two years until his appointment to the Senior Executive Service in January 2021. He is the senior CISA official in the region and is accountable for the execution of programs to defend critical infrastructure against the threats of today, while coordinating and collaborating with partners across all levels of government and in the private sector to secure against evolving threats of tomorrow. He serves as the senior advisor and liaison between DHS and senior federal, state, local, and tribal governments and private sector officials on matters relating to the security and resiliency of nationally, regionally, and locally significant critical infrastructure. Mr. Kirk is also responsible for directing incident management activities as they relate to critical infrastructure restoration and resilience.
Previous to his tenure with CISA, Mr. Kirk spent over 20 years of his federal career in a diverse and progressive set of positions in the Federal Emergency Management Agency (FEMA) in Region 7, most recently as the Federal Preparedness Coordinator and National Preparedness Division Director. In this position, Mr. Kirk served as a consultant and the principal advisor to the FEMA Regional Administrator regarding all preparedness matters. He led multiple programs and initiatives to strengthen, integrate, and operationalize the preparedness efforts of the region to build preparedness capabilities across all levels of government, jurisdictions, disciplines, critical infrastructure sectors, and citizen groups.
Before being named the first Federal Preparedness Coordinator in 2008, he served as the Chief of the Response Branch in the Response and Recovery Division. Prior to that assignment, Mr. Kirk was a Branch Chief in the Mitigation Division for five years. Mr. Kirk began his career in FEMA in 1994 as the Public Affairs and Congressional Liaison Officer.
In 1998, Mr. Kirk left FEMA and moved to Washington, DC, where he held the position of Intergovernmental Relations Manager for the U.S. Chemical Safety and Hazard Investigation Board, a then new independent federal agency, with the mission of ensuring the safety of workers and the public by reducing the number and severity of industrial chemical accidents. After serving a year in this position, Mr. Kirk returned to FEMA.
Prior to joining FEMA, Mr. Kirk was the District Director for a Member of the U.S. House of Representatives from the state of Kansas and was employed by the Congressman for nearly six years, starting in 1989.
Mr. Kirk holds a Master of Arts in Security Studies from the Naval Postgraduate School Center for Homeland Defense and Security. He obtained his Bachelor of Science degree in Agricultural Economics from Kansas State University. Mr. Kirk and his spouse, Shelly Kirk, reside in Oak Grove, Missouri.
- Caheen MurphySr. Solutions Architect, Cybersecurity, C1
Caheen Murphy is a highly experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.
- Bill HornPrincipal Product Security Architect, Bayer
Bill is an IT professional with over 20 years of experience driving DevOps, secure SDLC, cloud security, and security architecture initiatives. Holding both a Bachelor's and Master's degree in Cybersecurity and Information Assurance, he brings a strong academic foundation to his work. Bill's certification portfolio includes CISSP and GWAPT, among others. As a recognized expert, he regularly shares his insights as a presenter at his company's Security Champions speaker series.
- Brittany BodaneSenior Product Marketing Manager, AppOmni
Brittany Bodane is a Senior Product Marketer at AppOmni, where she works closely with security leaders, customers, and partners to better understand and communicate evolving SaaS security challenges. She translates these insights into strategies and education that help organizations secure their SaaS environments. Passionate about learning from security experts, she shares that knowledge to help protect user data and strengthen SaaS security practices.
- Panel Discussion
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Konnor AndersenVP, Sales, Zluri
Konnor is the Vice President of Worldwide Sales & Partnerships at Zluri, an identity security platform helping IT and security teams manage and secure SaaS applications. With nearly a decade in tech sales and leadership—from early-stage startups to $10B+ public companies—he brings extensive experience in scaling teams and driving growth. Konnor is passionate about building high-performing teams and shares insights on leadership and team building in today’s dynamic workplace.
- Panel Discussion
- Jim GarrettSr. Systems Director, Cyber Security, Saint Francis Health System
Jim Garrett is an IT executive, leader, architect, and governance expert with enterprise executive experience at the Saint Francis Health System, State of Missouri, New York State, 3M, Honeywell, Ingram Micro, Washington Mutual, and Maytag. Also significant healthcare consulting experience at MediSys Health Network, Salinas Valley Memorial Healthcare System, Saint Luke’s Health System, University of Washington Medical School, and University Hospital Rutgers. Technical and process experience includes deployment of enterprise wide IT Applications, Cyber Security Frameworks, Awareness and Training, Incident Event Management (SIEM), Identity and Access Management (IAM), Password Access Management (PAM), 2FA, Security Operation Center (SOC), Unified Threat Management (UTM), Web Application Firewalls (WAF), Data Leakage Prevention (DLP), Anti-ZeroDay, and Encase Enterprise Forensic technologies in multi-national environments. Operational responsibility for SAP and EPIC security and system provisioning and compliance requirements. Lean Sigma and Six Sigma process improvement experience.
- Maria SinghManager, Strategic Cybersecurity & AI Product Owner, EnterpriseKC
Maria Singh is a visionary cybersecurity and AI innovator at EnterpriseKC, leading transformative initiatives on the Heartland Cyber Range. EnterpriseKC is a business-led think-and-do tank driving enterprise development, innovation, and job growth. It maximizes regional prosperity by accelerating growth, retaining jobs and talent, expanding enterprises, and supporting startups and high-growth companies through targeted strategies and programs.
As the Cybersecurity Content Strategy Manager and Product Owner, Maria crafts dynamic training content and forges strategic partnerships with the government, industry, and academia. Much like the legendary Sword in the Stone, she is a beacon of transformation, countering emerging cyber threats and empowering the next generation of cyber practitioners to lead with resilience and vision.An accomplished author, speaker, and mentor, Maria is deeply committed to inspiring future generations. She has a passion for increasing the representation of women in cybersecurity. She also lends her expertise to developing AI chat agents to streamline operations, personalize customer experiences, and accelerate value creation.
- Naheed BleeckerBISO, RWE
- Holly GiammancoDirector, Information Security, Greater Kansas City Community Foundation | Greater Horizons
- Aaron WeissenfluhCOO, Tenfold Security, Board of Trustees, University of Saint Mary
Aaron cofounded Tenfold Security after serving thirteen years as the Chief Information Security Officer of American Century Investments and Cboe Global Markets (previously Bats Global Markets). He joined Bats Global Markets in 2008 and built the information security program from the ground up. Following the acquisition of Bats Global Markets by the Chicago Board Options Exchange (CBOE), he became the Global Chief Information Security Officer of the combined entity. In his role, he oversaw all information and physical security along with environmental, security compliance, personnel security, monitoring and policy/procedure.
Aaron holds an MBA and bachelor’s in education from the University of Saint Mary and a Bachelor’s in Telecommunications Management from DeVry University. He currently serves as a board member of the University of Saint Mary Board of Trustees and maintains a CISSP certification.
- Yvette KaranjaIT Support Analyst, Kansas Bureau of Investigation (KBI)
- Lillia NelsonEngineering Instructor, St. Teresa’s Academy
- Zaria NoronhaSystems Trainer, Amusement Connect LLC
- April Boyd-Noronha, ModeratorSr. Engineer, Information Security & Risk, and Cybersecurity Awareness Lead, Cardinal Health; Principal, The STEM Broker, LLC
April Boyd-Noronha, also known as The STEM Broker, consults parents, educational and civic entities on actively engaging the NextGen as they pursue careers in STEM. She is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities.
April has over 20 years of experience in academia and advanced technologies as an author, college professor, global keynote speaker and thought leader. Her expertise is on the future of work and emerging trends on diversity, equity, inclusion, and accessibility for persons of historically marginalized populations. She also is the new Global Security Awareness Manager for Cardinal Health. April continues to blaze a trail in equitable practices as the first Black elected school board member of the Shawnee Mission School District (SMSD) which is the 3rd largest school district in the state of Kansas. She is the parent of three children who all are pursuing a STEM career track in cybersecurity, engineering, and avionics (drones).
- Happy Hour
- Monica Cole-RoweCISO, National Association of Insurance Commissioners (NAIC)
- Britney KennedyGlobal BISO & Director of Business Partnership, Cardinal Health
Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since transitioned to Cardinal Health, initially leading Cyber Operations and now performing as the Director of Information Security Business Partnerships, providing Business Support, Security Awareness, and Compliance Operations across the Globe. Britney is a certified CISSP, CISM, PMP, SSAP. and holds certifications for CompTIA S+, CCSK, and IT Business Management. She holds a BS in Applied & Discrete Mathematics and an MS in Cybersecurity. Britney was also named an IT Security Power Player by SC Magazine and named as the Security Professional of the Year by ASIS Kansas City Chapter in 2020.
- Eric WaltersCISO, Burns & McDonnell
A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience includes healthcare cross-disciplinary compliance and privacy, software development, information security program management, cyber security managed services, federal government IT cloud deployments, global transition operations, and 20 years in the military.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
