Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 12, 2026
    9:00 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage
    • session level icon
    speaker photo
    Sr. Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Your CEO just asked about AI security.  Do you have a clear answer?
    While you’re counting vulnerabilities, your competitors are deploying AI at scale.
    While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.
    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.  And your cybersecurity team? Still writing policies nobody reads.
    In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
    What You’ll Master
    • The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    • Executive Translation — Turn technical AI risks into boardroom language
    • NIST AI RMF Implementation — Practical application, not theory
    • The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    • Shadow AI Discovery — Find and govern the AI already in your organization
    • Business-First Security — Protect value, not just systems
    Who Should Attend
    Ideal for:
    • CISOs facing board questions about AI
    • Information Security Directors enabling digital transformation
    • IT VPs without dedicated security teams
    • Cybersecurity Consultants serving enterprise clients
    • Risk Managers governing AI initiatives
    • Aspiring decision makers and those reporting to one
    Not designed for:
    • Developers wanting to code AI models
    • Analysts seeking technical certifications
    • Anyone looking for hands-on hacking labs
    What This Workshop Is (and Isn’t)
    This workshop is NOT about:
    • Prompt injection techniques
    • Model architecture security
    • Technical vulnerability scanning
    • Writing 200-page policies
    This workshop IS about:
    • Speaking profit-and-loss to executives
    • Enabling your AI transformations
    • Building cybersecurity into AI from day one
    • Becoming the trusted AI advisor
    What You’ll Leave With
    1. The Complete AIR-MAP Toolkit
    • 90-day implementation roadmap
    • Discovery templates and workflows
    • Risk scoring calculators
    • Executive presentation templates
    2. Ready-to-Deploy Governance Assets
    • AI Acceptable Use Policy (customize in minutes)
    • Vendor assessment questionnaires
    • Incident Response playbooks
    3. A 30-Minute Strategy Session
    A complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture.
  • Wednesday, May 13, 2026
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Simple Daily Habits to Strengthen Your Security Posture
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Session details to come.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    Focus Areas: Security Leadership; Executive Alignment; Career Development
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    10:15 am
    Quantum Readiness: Preparing Your Organization for a Post-Quantum Future
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Session details to come.

    10:15 am
    What You Need to Do NOW About Post-Quantum Cybersecurity
    • session level icon
    Focus Areas: Application Security; Encryption; Network Security
    speaker photo
    Cyber Resiliency, T-Mobile
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    This presentation will define the threats posed by Quantum Computing to the cryptographic protocols used in every enterprise. It will discuss the timelines and the steps you need to take to prepare and protect your enterprise.
    Audience members will understand the risks and timelines associated with the arrival of Post-Quantum cryptography, and the impact on their business from the cryptographic algorithms used in the enterprise.
    10:15 am
    Modern Ransomware: Double Extortion, Data Destruction, and Targeted Campaigns
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Session details to come.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    11:10 am
    Presume a Breach: Evidence-Based Risk Assessment Scoring
    • session level icon
    Focus Areas: Security Awareness, Threat Intelligence
    speaker photo
    CISO, RSi RCM
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Risk assessment is communication. Reduce the number of arguments associated with Risk Assessment both before and during an incident. The largest difficulty in communicating risk is the subjective nature of Likelihood measurement and to a lesser extent the measurement for impact. By applying existing models we set a common understanding of these measurements that provides evidence and reduces ambiguity. The Evidence-Based Risk Assessment (EBRA) is a fundamental change in the beginning of the process that improves communication both up and down the leadership and simplifies the normally complex effort to finalize risk assessment.

    11:10 am
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session details to come.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    Zero Trust in Practice: What Real-World Implementations Look Like Now
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Session details to come.

    1:15 pm
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Session details to come.

    1:15 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    speaker photo
    VP of IT, Commonwealth LNG
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    What’s Keeping You Up at Night?
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    Head to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.

    2:10 pm
    Artificial Intelligence, Artificial Assurance?
    • session level icon
    Focus Areas: Artificial Intelligence, GRC, Risk & Control Frameworks
    speaker photo
    CISO, Spektrum Labs
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Modern GRC platforms increasingly use AI to normalize frameworks, map overlapping controls, and automate evidence reuse across standards such as NIST, ISO 27001, SOC 2, and CIS. While this approach improves efficiency, it introduces a structural limitation: most systems begin with framework control statements and work downward toward evidence.

    This session examines why that model can create misleading equivalence across frameworks. Control statements describe intent, not implementation. When platforms map similar language between standards, they often assume control alignment without validating whether the underlying technical implementation, configuration state, and testing mechanisms truly satisfy each requirement.

    We’ll explore the distinction between control “decorators” (framework assertions) and operational “primitives” (identity systems, access workflows, logging configurations, backup immutability, telemetry coverage, etc.), and why assurance should originate at the implementation layer. By reversing the model—starting with validated control implementations and applying frameworks as contextual overlays—organizations can move from documentation-centric compliance to measurable, implementation-centric resilience.

    Attendees will gain a practical lens for evaluating AI-enabled GRC tooling and strengthening the technical integrity of their assurance programs.

    2:10 pm
    [Panel] World Cup 2026 Cyber Threats: What Kansas City Must Know Before the Crowds Arrive
    • session level icon
    Focus Areas:  Cybersecurity Awareness and Cyber Threats
    speaker photo
    Cyber Risk & Governance Advisor | Community Security Leader
    speaker photo
    Cyber Resilience & GRC Strategist | Fractional CISO for Law Firms | TEDx Speaker
    speaker photo
    VP & Information Security Officer, Netswitch Technology Management
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    Global events like the FIFA World Cup bring excitement, revenue, and worldwide attention, but they also create ideal conditions for cybercrime.
    As Kansas City prepares to welcome international visitors in 2026, cybercriminals are already preparing their playbooks. Phishing campaigns, fake ticket and merchandise sites, QR-code scams, rogue Wi-Fi networks, impersonation fraud, and AI-enabled deepfakes consistently surge around mega-events, targeting individuals and small businesses operating under pressure, speed, and distraction.
    In this session, Dr. Cheryl Cooper, Cyber Resilience Strategist and Fractional CISO, joined by Sean Mahoney of Netswitch Technology Management, and Naeem Babri, examines how real-world cyber incidents unfold during large-scale events, and why traditional “best practices” often fail when trust, urgency, and human behavior are exploited.
    Drawing on more than two decades of experience across Fortune 100 enterprises, government, and executive security leadership, the speakers translate threat intelligence into practical, decision-focused guidance attendees can apply immediately.
    This session connects cyber risk to lived experience through specific scenarios involving hotels, retailers, travelers, and local businesses in Kansas City. Attendees will learn how attackers exploit human behavior more often than technology, how small decisions cascade into financial and reputational damage, and which controls matter most when time and attention are limited.
    Participants will leave with a clear understanding of the most likely World Cup-related cyber threats, how to recognize and interrupt attack chains, and what actions leaders, employees, and individuals must take now to protect data, money, and trust, before the crowds arrive.
    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask Us Anything! A Live Conversation with Security Leaders
    • session level icon
    Focus Areas: Leadership, Decision Making, Communication
    speaker photo
    CISO, Security Bank of Kansas City
    speaker photo
    BISO, BlueScope North America
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    In an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.

    This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.

    Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.

    Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.

    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • Canary Trap
    Booth: TBD

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Concentric AI
    Booth: TBD

    Concentric AI is intelligent data security made easy. Its Semantic Intelligence™ platform uses context-aware AI to discover sensitive data, monitor risks, automate remediation, simplify compliance, and accelerate investigations. It delivers smart, targeted protection by understanding how data is used, shared, and exposed. Concentric AI also offers managed services to keep security programs lean, scalable, and effective. This end-to-end platform protects data at rest, data in motion, and all the GenAI tools users interact with—so organizations can stay compliant, reduce exposure, and safeguard critical information wherever it lives and however it travels.

  • EnterpriseKC
    Booth: TBD

    EnterpriseKC is a business-led, systems driven, “think and do” tank focused on enterprise development, innovation, and job growth within high value, high opportunity industry clusters. We work directly with business, academia, and government to understand current cluster ecosystems and to advance strategies and programs that result in accelerated enterprise growth and economic prosperity throughout Kansas and Western Missouri.

  • Exabeam
    Booth: TBD

    Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution. With consistent leadership in AI innovation and a proven track record in security information and event management (SIEM) and user behavior analytics, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline operations. Learn more at www.exabeam.com.

  • InfraGard Kansas City
    Booth: TBD

    InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.

    The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.

  • ISACA Kansas City
    Booth: TBD

    Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.

  • ISC2 Kansas City Chapter
    Booth: TBD

    The mission of ISC2 Kansas City (KC) Chapter is to advance the Information Security Profession by leveraging our shared body of knowledge to better our communities, groom the next generation of security professionals by delivering solutions to real-world security problems and issues that our members face.

    “We” began as a few security-minded friends that worked together.  We decided to quit talking about launching a local ISC2 chapter in Kansas City or worse yet, wait around for someone else to do it for us.  We stepped up and took the initiative.  We have been growing as others hear about our group and join with us.

  • Island
    Booth: TBD

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Parallels, Inc.
    Booth: TBD

    Parallels is a global leading brand in cross-platform solutions that make it simple for businesses and individuals to use and access the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology out there, whether it’s Windows, Mac, ChromeOS, iOS, Android, or the cloud. Parallels solves complex engineering and user-experience problems by making it simple and cost-effective for businesses and individual customers to use applications anywhere, anytime.

  • Qualys, Inc.
    Booth: TBD

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • ISSA Kansas City
    Booth: TBD

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

  • Splunk, a Cisco Company
    Booth: TBD

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • Sublime Security
    Booth: TBD

    Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.

  • Sumo Logic
    Booth: TBD

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • WiCyS Kansas City Affiliate
    Booth: TBD

    We are the Kansas City Metroplex affiliate of WiCyS serving 14 counties across Kansas and Missouri.

    Women in Security (WiCyS) helps build a strong cybersecurity workforce with gender equality by facilitating recruitment, retention and advancement for women in the field. WiCyS offers mentoring, training programs, scholarships, virtual and in-person conferences, leadership series, career fairs, webinars, and more to women at all stages of their cybersecurity career journey!

    Women in Cyber Security (WiCyS) is the premier organization with national reach dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking and mentoring. WiCyS is a non-profit organization offering many membership, sponsorship and collaboration benefits.

    As a member of WiCyS, you have access to all the resources and opportunities provided by our network. From community groups to career fairs, scholarships to speaking opportunities, and much more, we’re here to support your growth in the field of cybersecurity.

    WiCyS is the only non-profit membership organization with global reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.

    Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.

  • Women in Security – Kansas City
    Booth: TBD

    Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.

  • Zafran Security
    Booth: TBD

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rodney Beard, CISSP - Instructor
    Sr. Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Rodney Beard, CISSP, is a cybersecurity consultant with Cyber Risk Opportunities LLC, bringing more than 20 years of experience protecting organizations across defense, government, and financial services sectors.

    Most recently, Rodney served as Information Security Officer at Rivermark Community Credit Union, a $2B institution in Oregon, where he built and led the enterprise security program for seven years. His responsibilities included penetration testing, security architecture, incident response, vendor risk management, and developing security awareness training for employees.

    Prior to financial services, Rodney spent eight years as an IT Specialist with the U.S. Army at White Sands Missile Range, where he served as Information Management Officer responsible for IT security across 22 regional locations and 250 employees. He implemented security policies aligned with NIST, Federal, and DoD standards while managing a program portfolio valued at $2.5 million.

    Rodney has also taught technology courses as an Adjunct Instructor at Vista College, preparing students for CompTIA A+ and Network+ certifications.

    He holds the CISSP certification, CompTIA Security+, Network+, and A+, along with multiple Microsoft certifications. Rodney is based in Casper, Wyoming, and works remotely with clients nationwide.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Jack Sippel
    Cyber Resiliency, T-Mobile

    CISSP and Security+ certified Principal Cybersecurity Engineer using system engineering principles and a lot of curiosity.

  • speaker photo
    Bill Guyer
    CISO, RSi RCM

    Bill Guyer is a seasoned veteran of the IT security battle. With more than 30 years experience at all levels of technology support and strategy, Bill brings a comprehensive, expert, and people focused point of view to the industry. Bill has achieved multiple certifications including CISSP, ITIL, and PMP, and has experience applying the concepts associated in real-world scenarios. Bill is currently the CISO for RSi RCM in Columbia, SC. He is also a board member of the Kansas City Chapter of ISC2, and active in mentoring new security professionals.

  • speaker photo
    Panel Discussion
  • speaker photo
    Jason Cradit, Moderator
    VP of IT, Commonwealth LNG

    Jason Cradit is a highly-skilled technology executive with a passion for creating innovative solutions in the energy and utilities industry. For two decades, Jason has helped companies use technology to streamline their processes, reduce costs, and increase efficiencies by challenging the status quo and leading teams to set higher bars with modern technologies. He is a versatile executive with experience as a software solutions leader, consultant, and operator. Jason's academic journey includes a bachelor's degree in business management from Baker University, a master's in computer science from the University of Kansas, and a master’s in business administration from Rockhurst University. Additionally, he holds many industry certifications such as CISSP, CCSP, AWS Architect, Azure Architect, and many more.

  • speaker photo
    Panel Discussion
  • speaker photo
    Joshua Brown
    CISO, Spektrum Labs

    Joshua Brown is a CyberSecurity executive with over 25 years of experience building and transforming security programs across multiple companies. As the Chief Information Security Officer (CISO) of Spektrum Labs, Joshua is shepherding the product development of Spektrum Resilience, transforming the relationship between SecOps, resilience, and compliance. Prior to that, he founded Digital Defense Consulting and was the Global CISO of H&R Block.

    He has been a mentor for the SANS Institute and a frequent author and speaker on myriad information security topics, including speaking at the InfoSec World conference, the ISC2 World Congress, and being published in Security Current magazine and Enterprise Security magazine. Joshua was named a Top Global CISO by Cyber Defense Magazine in 2023; a Top 10 CISO by Enterprise Security Magazine in 2023; and a Top 100 CISO by Security Currents in 2024.

  • speaker photo
    Naeem Babri
    Cyber Risk & Governance Advisor | Community Security Leader

    Naeem Babri is a cyber risk and governance professional with extensive experience supporting organizations in risk assessment, compliance, and executive-level decision support. Known for his ability to translate complex risk information into clear, actionable insight, Naeem works closely with leadership teams to strengthen data protection, operational resilience, and business continuity in evolving threat environments.

    He holds a Master of Science in Computer Resource Management and a Bachelor of Science in Mathematics and Computer Science, grounding his advisory work in both technical rigor and analytical problem-solving. Naeem’s professional background includes information risk management, risk scoring and reporting, audit and compliance support, disaster recovery, and business continuity planning, with a strong emphasis on communication and stakeholder trust.

    Beyond his advisory work, Naeem is a long-standing leader in the cybersecurity community. He has served as President of the Information Systems Security Association – Greater Kansas City Chapter (ISSA-KC) since 2014, where he provides strategic and operational leadership, guides chapter programming, and collaborates with industry partners, sponsors, and media to advance cybersecurity education and engagement. He also serves as Vice President of Women in CyberSecurity (WiCyS) Kansas City, part of a global organization with a presence across Asia, Australia, Africa, Europe, and the United Kingdom.

    Naeem brings a human-centered perspective to cybersecurity, focusing on how communication, trust, and decision-making shape real-world outcomes. Outside of his professional work, he is an avid marathon runner and a patron of the arts, interests that reflect the discipline, endurance, and creativity he brings to leadership and risk governance.

  • speaker photo
    Dr. Cheryl Cooper, CISSP
    Cyber Resilience & GRC Strategist | Fractional CISO for Law Firms | TEDx Speaker

    Dr. Cheryl Cooper helps managing partners and executive leaders protect what matters most: client trust, firm reputation, and revenue. A Cyber Resilience and GRC Strategist, Fractional CISO for managing partners and law firms, TEDx Speaker, author, and United States Navy Veteran, she is known for translating complex cyber risk into clear, defensible leadership decisions, without fear tactics or technical jargon.

    With more than two decades of experience across Fortune 100 enterprises, the U.S. Navy, and executive security leadership, Dr. Cooper has advised organizations where cyber incidents carry legal, financial, and reputational consequences. Her background includes serving as a Business Information Security Officer supporting Legal, HR, and Finance functions, giving her a rare, leadership-level perspective at the intersection of governance, liability, and operational resilience.

    Dr. Cooper is a higher education cybersecurity adjunct professor and President of the Women in CyberSecurity (WiCyS) Kansas City Metroplex Affiliate, part of a global organization advancing cybersecurity leadership across industry, government, and academia. She is also the creator of the Cyber Resilience Compass™, a plain-language framework that helps leaders understand what puts their organizations at risk, what matters most right now, and which decisions leadership, not IT, must own. A core part of her work includes short executive engagements that clarify risk priorities, decision ownership, and next steps long before a crisis forces the conversation. Her keynote presentations combine executive storytelling with practical guidance, helping audiences recognize how human behavior, trust, and urgency are exploited long before technology fails.

  • speaker photo
    Sean Mahoney
    VP & Information Security Officer, Netswitch Technology Management

    Sean Mahoney is a cybersecurity executive and Information Security Officer at Netswitch Technology Management who helps organizations govern cyber and AI risk as a business priority, not just a technical function. With more than two decades of executive leadership experience and over ten years in security leadership, Sean is known for translating risk, compliance, and emerging technology exposure into measurable business outcomes.

    Before entering cybersecurity, Sean spent 30 years in global supply chain and executive management, serving as an EVP for an international manufacturing and distribution company with operations across North America. In that role, he was responsible for enterprise risk oversight, operational resilience, and large-scale digital transformation, experience that now informs his pragmatic, business-first approach to cybersecurity and AI governance.

    A CISM-certified executive, Sean has designed and led risk and compliance programs aligned with ISO 27001, SOC 2, HIPAA, GDPR, FINRA, CMMC, and the NIST AI Risk Management Framework. His work has delivered tangible results, including accelerated audit readiness, significant reductions in detection and response times, and risk remediation efforts that enabled multimillion-dollar contract wins.

    Sean regularly advises executive teams and boards on responsible AI adoption, governance controls, and model risk management. He is also the publisher of the Cyber Risk Governance Insights newsletter and co-host of the Cybersecurity Chronicles podcast, where he bridges the gap between boards, executives, auditors, and technologists by framing cyber risk as a leadership and governance issue first.

  • speaker photo
    Panel Discussion
  • speaker photo
    Bill Kim
    CISO, Security Bank of Kansas City

    Bill spent a couple of decades pretending to be someone else as a stage actor and radio personality. After making the shift from entertainer to IT generalist, Bill gravitated toward security through compliance and federal regulatory obligations. For nearly 28 years, Bill has obtained dozens of worthwhile certifications, worked in every aspect of IT from entry level Help Desk to CISO and almost every stop along the way. If it fits in the IT, IT Security, GRC bucket, Bill has probably touched it. Recently, more time has been spent refreshing compliance programs, finding products and processes that address gaps and inconsistencies, along with pushing slippery rocks up slippery hills on windy days.

  • speaker photo
    Cara Walls
    BISO, BlueScope North America
  • speaker photo
    Panel Discussion
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.