Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 7, 20259:00 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous FutureSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO & Managing Director, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
9:00 am[PLUS Course] Master the Art of Cybersecurity StrategyBuild, Lead, Succeed: A Hands-On CISO Strategy WorkshopCISO, Dolby LaboratoriesCISO, i3 VerticalsRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmYou’ve landed the coveted Chief Information Security Officer (CISO) role—now what? The cornerstone of every CISO’s success is crafting a security strategy that aligns with their organization’s unique needs. But where do you begin?
Join seasoned CISOs Yaron Levi and Neil Watkins in an intensive, hands-on workshop designed to equip you with the tools and frameworks to build a cybersecurity strategy that works for your organization.
In this interactive session, you will:
- Define your organization’s risk appetite.
- Identify the controls and capabilities needed for robust cybersecurity.
- Develop a purpose-driven strategy with clear principles and priorities.
By the end of the day, you will have created an actionable cybersecurity strategy tailored to your organization. You will also present your strategy for expert feedback and collaborate with peers to refine your approach.
This workshop is designed for acting CISOs or experienced security practitioners who aspire to lead at the highest level.
Agenda:
- 9:00–10:00 AM: Strategy Fundamentals—Insights from the Experts
- 10:00–12:00 PM: Group Work—Building Your Strategy
- 12:00–1:00 PM: Lunch
- 1:00-3:00 PM: Strategy Presentations, Feedback, and Winner Announcement
Seats are limited—Reserve your spot now!
With only 20 participants (5 groups of 4), this workshop offers personalized attention and invaluable insights from experts. Don’t miss this opportunity to accelerate your career and strengthen your organization’s security posture. - Thursday, May 8, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] How CISOs Can Elevate Influence and Become a Business DriverRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterFor today’s CISOs, it’s no longer enough to be just technical experts. This panel of top-level cybersecurity professionals representing the regions of Vancouver, B.C., Bozeman, and Seattle, breaks away from talking about the tired mantra of “speaking the language of the business” and instead dives into practical, real-world examples of how security leaders have successfully navigated the business landscape.
The discussion focuses on actionable strategies and tactics that have helped CISOs gain influence, secure funding, and elevate cybersecurity from a technical function to a critical business driver. Walk away with specific metrics, communication techniques, and actionable insights that have been proven to work in the real world—offering practical takeaways that can be implemented immediately. Get ready for a session that goes beyond the theory and delivers tangible answers to the challenges CISOs face today.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amDeveloping Strategies and Governance Policies Around AIRegistration Level:Conference Pass
10:15 am - 11:00 amAs AI continues to revolutionize the business landscape, organizations face the critical challenge of harnessing its potential while mitigating associated risks. This panel session brings together experts from varying industries to explore the intricacies of developing comprehensive AI strategies and governance policies.
Our presenter(s) will delve into:
- The current state of AI adoption across various industries and its impact on cybersecurity
- Key components of an effective AI strategy, including alignment with business objectives and ethical considerations
- Designing governance frameworks that ensure responsible AI use while fostering innovation
- Addressing AI-specific risks, including bias, privacy concerns, and potential security vulnerabilities
- Regulatory landscape and compliance requirements for AI implementation
- Best practices for data management and protection in AI-driven environments
- Ethical considerations in AI development and deployment
- Strategies for building AI literacy within organizations
- Future trends and preparing for the evolving AI landscape
Gain valuable insights into creating balanced, forward-thinking AI strategies that maximize benefits while maintaining robust security and ethical standards. The session provides practical guidance on navigating the complex intersection of AI, business objectives, and regulatory requirements.
10:15 amIt Takes All of Us to #SecureOurWorld – Help CISA Reduce Risk to America's Digital InfrastructureDirector, Region 7, DHS CISARegistration Level:Conference Pass
10:15 am - 11:00 amWe need your help. Security experts with the Cybersecurity and Infrastructure Security Agency (CISA) are working to secure our nation’s cybersecurity, but we can’t do it alone. We need YOU to help us educate others, and we need everyone to take steps to help make themselves more secure online. That’s the purpose of the Secure Our World program. Secure Our World provides no-cost ways for individuals, businesses, and organizations to take the steps needed to reduce our collective cyber risk. Together we can secure America and secure our world.
10:15 amBug Bounties: Tips from the TriagerRegistration Level:Open Sessions
10:15 am - 11:00 amHear directly how someone who has spent years reviewing and prioritizing bug bounty program submissions approaches the task. In this talk, discover how to craft reports that stand out, ensuring your findings are presented for maximum impact and value. Discover the most common pitfalls to avoid, tips on how to structure your reports for clarity and precision, and hear highlights of the key elements triagers focus on to determine the severity and validity of vulnerabilities.
10:15 amTabletop Exercises: The Fun KindRegistration Level:Open Sessions
10:15 am - 11:00 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amTracking the Massive Changes to Privacy Laws in the U.S.Registration Level:Conference Pass
11:10 am - 11:55 amSession description to come.
11:10 amBuilding Trusted Partnerships to Enable Secure ProductsRegistration Level:Conference Pass
11:10 am - 11:55 amIn today’s interconnected digital ecosystem, the security of any product is only as strong as its weakest link. This panel session explores the critical role of trusted partnerships in developing and maintaining secure products throughout their lifecycle.
Our distinguished panel delves into the challenges and opportunities of fostering collaborative relationships between vendors, suppliers, and customers to enhance product security. They examine how these partnerships can lead to more robust security measures, improved threat intelligence sharing, and faster response times to emerging vulnerabilities. Key topics include:
- Establishing trust in the supply chain
- Collaborative approaches to secure software development
- The role of transparency in building and maintaining trust
- Balancing intellectual property concerns with security needs
- Leveraging partnerships for more effective incident response
- Case studies of successful security-focused partnerships
11:10 amCyber Risk by the Numbers from a Cyber Insurance PerspectiveRegistration Level:Open Sessions
11:10 am - 11:55 amYou’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceRegistration Level:Open Sessions
11:10 am - 11:55 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of ConflictCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThis informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.
Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.
He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmCybersecurity Challenges for Small and Medium BusinessesRegistration Level:Conference Pass
1:15 pm - 2:00 pmSmall and medium businesses (SMBs) are the backbone of the U.S. economy, generating over half of the annual GDP and employing millions of Americans. But they also face unique cybersecurity challenges that can threaten their survival and growth. In this talk, learn how to assess and mitigate the cyber risks that SMBs face, and how to implement a robust cybersecurity program with limited resources and expertise.
We cover the following topics:
- The state of SMB cybersecurity in the U.S.
- The cost and impact of cyber breaches on SMBs
- The main cyber threats and vulnerabilities that SMBs face
- The best practices and frameworks for SMB cybersecurity
- The steps to build or improve your cybersecurity program
Whether you are an IT manager, a cybersecurity professional, or a business owner, this talk is informative and practical. Walk away with a better understanding of the cyber landscape and the tools and techniques to protect your SMB from cyberattacks.
1:15 pmManaging Security and Technology After an AcquisitionRegistration Level:Conference Pass
1:15 pm - 2:00 pmSession description to come.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:Open Sessions
1:15 pm - 2:00 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityRegistration Level:Open Sessions
1:15 pm - 2:00 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:00 pmNetworking BreakRegistration Level:Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmCyber Incident Response Planning—More Important than Ever BeforeSr. Systems Director, Cyber Security, Saint Francis Health SystemRegistration Level:Conference Pass
2:10 pm - 2:55 pmEven if you don’t have a best practice cybersecurity framework in place, you must have a best practice security incident response plan in place. The plan sets the tone at the top, it highlight framework gaps, and it utilizes tools such as training and table top exercises to help focus on priorities. It is whistleblowing without blowing the whistle.
A best practice cybersecurity incident response plan must be founded in recognized and accepted industry standards. Standards such as the U.S. National Institute of Standards and Technologies (NIST) 800–61R3 for incident response and the NIST 800–53 for cybersecurity best practice controls must be referenced. These two key NIST documents highlight the critical components required to build an institution’s best cybersecurity framework.
2:10 pmThe Sword in the Stone in Cyber: Forging a Resilient Workforce Talent PipelineManager, Strategic Cybersecurity & AI Product Owner, EnterpriseKCRegistration Level:Conference Pass
2:10 pm - 2:55 pmIn the timeless legend of King Arthur, the Sword in the Stone was more than just a mystical object—it symbolized destiny, potential, and the rightful passage of leadership. Just as Arthur was chosen for his unique qualities, today’s cybersecurity landscape demands an approach that identifies and nurtures emerging talent, ensuring that the next generation of cyber guardians is ready to lead with resilience and innovation.
This title parallels the magical act of drawing the sword and the strategic process of workforce talent pipeline development and training in cybersecurity. It emphasizes the following key ideas:
- Identifying the Right Talent
- Accelerated Skill Development
- Diverse Cyber Roles and Specializations
- Nurturing Emerging Leaders
- Ensuring Continuity and Resilience
- Empowering Through Transformation
“The Sword in the Stone of Succession Planning in Cyber” encapsulates the magic and imperative of strategic talent development across the full spectrum of cybersecurity roles. It serves as a call to action for organizations to invest in their most valuable asset—their people—ensuring that they are equipped, empowered, and ready to defend the digital realm now and in the future.
2:10 pmSocial Engineering: Training the Human FirewallRegistration Level:Open Sessions
2:10 pm - 2:55 pmPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceRegistration Level:Open Sessions
2:10 pm - 2:55 pmIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:Open Sessions
3:00 pm - 4:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in CybersecurityCISO, Mazuma Credit UnionDirector, Cybersecurity & IT Infrastructure, Burns & McDonnellRegistration Level:Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterAs the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.
Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.
- AppOmniBooth: TBD
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- C1Booth: 210
C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- CyberhavenBooth: TBD
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- ExpelBooth: 180
Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.
- InfraGard Kansas CityBooth: TBD
InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.
The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.
- ISACA Kansas CityBooth: TBD
Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
- ISC2 Kansas City ChapterBooth: TBD
The mission of ISC2 Kansas City (KC) Chapter is to advance the Information Security Profession by leveraging our shared body of knowledge to better our communities, groom the next generation of security professionals by delivering solutions to real-world security problems and issues that our members face.
“We” began as a few security-minded friends that worked together. We decided to quit talking about launching a local ISC2 chapter in Kansas City or worse yet, wait around for someone else to do it for us. We stepped up and took the initiative. We have been growing as others hear about our group and join with us.
- ISSA Kansas CityBooth: TBD
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- Ping IdentityBooth: TBD
Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.
- TevoraBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS Kansas City AffiliateBooth: TBD
We are the Kansas City Metroplex affiliate of WiCyS serving 14 counties across Kansas and Missouri.
Women in Security (WiCyS) helps build a strong cybersecurity workforce with gender equality by facilitating recruitment, retention and advancement for women in the field. WiCyS offers mentoring, training programs, scholarships, virtual and in-person conferences, leadership series, career fairs, webinars, and more to women at all stages of their cybersecurity career journey!
Women in Cyber Security (WiCyS) is the premier organization with national reach dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking and mentoring. WiCyS is a non-profit organization offering many membership, sponsorship and collaboration benefits.
As a member of WiCyS, you have access to all the resources and opportunities provided by our network. From community groups to career fairs, scholarships to speaking opportunities, and much more, we’re here to support your growth in the field of cybersecurity.
WiCyS is the only non-profit membership organization with global reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.
Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.
- Women in Security – Kansas CityBooth: TBD
Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Glen Sorensen, InstructorvCISO & Managing Director, Cyber Risk Opportunities LLC
Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.
- Yaron Levi, InstructorCISO, Dolby Laboratories
Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a Research Fellow for the Cloud Security Alliance, serves as an advisory board member for several information security companies, and is co-founder of the Kansas City CISO forum. He graduated from the FBI CISO academy in 2018, and currently serves on the board of InfraGard KC.
- Neil Watkins, InstructorCISO, i3 Verticals
- Phil KirkDirector, Region 7, DHS CISA
Phil Kirk is the Region 7 Director for the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. Department of Homeland Security (DHS). Region 7 is headquartered in Kansas City, Missouri, and serves the states of Iowa, Kansas, Missouri and Nebraska. CISA is the Nation’s risk advisor, working with partners to defend against today’s digital and physical threats and collaborating to build more secure and resilient infrastructure for the future.
Through leadership and management of field-based resources and capabilities, Regional Directors guide all of CISA’s numerous and varied programs. Mr. Kirk was selected as Regional Director of the Office of Infrastructure Protection in the National Protection and Programs Directorate (NPPD) of DHS in 2016, prior to the creation of CISA through the Cyber Security and Infrastructure Security Act of 2018. He then served as the Acting Director of CISA Region 7 for two years until his appointment to the Senior Executive Service in January 2021. He is the senior CISA official in the region and is accountable for the execution of programs to defend critical infrastructure against the threats of today, while coordinating and collaborating with partners across all levels of government and in the private sector to secure against evolving threats of tomorrow. He serves as the senior advisor and liaison between DHS and senior federal, state, local, and tribal governments and private sector officials on matters relating to the security and resiliency of nationally, regionally, and locally significant critical infrastructure. Mr. Kirk is also responsible for directing incident management activities as they relate to critical infrastructure restoration and resilience.
Previous to his tenure with CISA, Mr. Kirk spent over 20 years of his federal career in a diverse and progressive set of positions in the Federal Emergency Management Agency (FEMA) in Region 7, most recently as the Federal Preparedness Coordinator and National Preparedness Division Director. In this position, Mr. Kirk served as a consultant and the principal advisor to the FEMA Regional Administrator regarding all preparedness matters. He led multiple programs and initiatives to strengthen, integrate, and operationalize the preparedness efforts of the region to build preparedness capabilities across all levels of government, jurisdictions, disciplines, critical infrastructure sectors, and citizen groups.
Before being named the first Federal Preparedness Coordinator in 2008, he served as the Chief of the Response Branch in the Response and Recovery Division. Prior to that assignment, Mr. Kirk was a Branch Chief in the Mitigation Division for five years. Mr. Kirk began his career in FEMA in 1994 as the Public Affairs and Congressional Liaison Officer.
In 1998, Mr. Kirk left FEMA and moved to Washington, DC, where he held the position of Intergovernmental Relations Manager for the U.S. Chemical Safety and Hazard Investigation Board, a then new independent federal agency, with the mission of ensuring the safety of workers and the public by reducing the number and severity of industrial chemical accidents. After serving a year in this position, Mr. Kirk returned to FEMA.
Prior to joining FEMA, Mr. Kirk was the District Director for a Member of the U.S. House of Representatives from the state of Kansas and was employed by the Congressman for nearly six years, starting in 1989.
Mr. Kirk holds a Master of Arts in Security Studies from the Naval Postgraduate School Center for Homeland Defense and Security. He obtained his Bachelor of Science degree in Agricultural Economics from Kansas State University. Mr. Kirk and his spouse, Shelly Kirk, reside in Oak Grove, Missouri.
- Panel Discussion
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Panel Discussion
- Jim GarrettSr. Systems Director, Cyber Security, Saint Francis Health System
Jim Garrett is an IT executive, leader, architect, and governance expert with enterprise executive experience at the Saint Francis Health System, State of Missouri, New York State, 3M, Honeywell, Ingram Micro, Washington Mutual, and Maytag. Also significant healthcare consulting experience at MediSys Health Network, Salinas Valley Memorial Healthcare System, Saint Luke’s Health System, University of Washington Medical School, and University Hospital Rutgers. Technical and process experience includes deployment of enterprise wide IT Applications, Cyber Security Frameworks, Awareness and Training, Incident Event Management (SIEM), Identity and Access Management (IAM), Password Access Management (PAM), 2FA, Security Operation Center (SOC), Unified Threat Management (UTM), Web Application Firewalls (WAF), Data Leakage Prevention (DLP), Anti-ZeroDay, and Encase Enterprise Forensic technologies in multi-national environments. Operational responsibility for SAP and EPIC security and system provisioning and compliance requirements. Lean Sigma and Six Sigma process improvement experience.
- Maria SinghManager, Strategic Cybersecurity & AI Product Owner, EnterpriseKC
Maria Singh is a visionary cybersecurity and AI innovator at EnterpriseKC, leading transformative initiatives on the Heartland Cyber Range. EnterpriseKC is a business-led think-and-do tank driving enterprise development, innovation, and job growth. It maximizes regional prosperity by accelerating growth, retaining jobs and talent, expanding enterprises, and supporting startups and high-growth companies through targeted strategies and programs.
As the Cybersecurity Content Strategy Manager and Product Owner, Maria crafts dynamic training content and forges strategic partnerships with the government, industry, and academia. Much like the legendary Sword in the Stone, she is a beacon of transformation, countering emerging cyber threats and empowering the next generation of cyber practitioners to lead with resilience and vision.An accomplished author, speaker, and mentor, Maria is deeply committed to inspiring future generations. She has a passion for increasing the representation of women in cybersecurity. She also lends her expertise to developing AI chat agents to streamline operations, personalize customer experiences, and accelerate value creation.
- Happy Hour
- Eric WaltersDirector, Cybersecurity & IT Infrastructure, Burns & McDonnell
A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience includes healthcare cross-disciplinary compliance and privacy, software development, information security program management, cyber security managed services, federal government IT cloud deployments, global transition operations, and 20 years in the military.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
