Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 18, 2023
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, October 19, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Implementing Efficient Vendor Risk Management in the Cloud: A Balanced Approach
    • session level icon
    speaker photo
    STAR Program Director, Cloud Security Alliance
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    In the evolving digital era, efficient vendor risk management has emerged as a key component of a robust business strategy. With a growing reliance on third-party service providers, it becomes imperative for businesses to effectively evaluate and manage the associated risks to ensure business continuity and security. This presentation focuses on the broader aspects of vendor risk management and touches upon the use of supportive tools and process. Our discussion includes an overview of vendor risk management principles, techniques, and best practices, and how they are used as a part of this comprehensive strategy. In this presentation, we will explore various facets of vendor risk management, from risk identification and assessment to mitigation and monitoring. We will discuss how tools like the CSA Consensus Assessment Initiative Questioner (CAIQ) are contributing to these processes globally by offering a structured approach to evaluate potential cloud service vendors, ensuring no crucial security aspect is overlooked. Attendees will leave with a holistic understanding of vendor risk management, with insights on how to incorporate the proper tools into their current strategies, enhancing their overall approach to mitigate potential risks, and ensuring business resilience and sustainability.
    8:00 am
    WiCys Chapter Meeting
    • session level icon
    Open to all attendees
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am

    Session description coming soon.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    speaker photo
    VP Segment & Technology Product Security, Humana
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am

    This roundtable discussion is for our Advisory Council members only.

    9:00 am
    [Opening Keynote] Cybersecurity Fusion: Uniting Forces for Modern Digital Defense
    • session level icon
    speaker photo
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
    speaker photo
    CISO, Veterans United Home Loans
    speaker photo
    Instructor - Cybersecurity, Webster University
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Hear from local cybersecurity executives in an electrifying panel discussion on how industry leaders collaborate across sectors, academia, and organizations to tackle evolving cyber threats. You’ll gain valuable insights on innovative strategies, emerging technologies, and interdisciplinary approaches to reinforce digital defenses and protect against cyber risks for your organization. Open Q&A following discussion.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:15 am
    SOC Essentials: Assembling Your First Response Team
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    The Security Operations Center (SOC) is an organization’s first eyes and ears to security threats and risks. For the SOC to support being an organization’s first response team, the team must have the proper resources for continuous growth and monitoring to keep an organization secure. This discussion focuses on key foundational elements for developing and maturing a SOC. Attendees will learn how to establish processes, procedures, and growth plans for their SOC. Additionally, use metrics to show maturity opportunities within a SOC and identify cyber security risks in a business.
    10:15 am
    The Science of Normal: Changing Cybersecurity and Your Poker Game
    • session level icon
    speaker photo
    Sales CTO & Principal Systems Engineer, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    You wouldn’t play poker blind, so why search for cyberthreats without analytics?

    Searching data lakes for cybersecurity threats or vulnerable assets without using scaled analytics is like playing a round of poker while blindfolded! You always want the upper hand, so in this talk, you’ll learn how security related content including pre-built reports, dashboards, and visualizations can handle common security and compliance requirements. Analytics ensure sound security postures so organizations don’t fold to cyber threats.

    By simplifying the review of an enterprise data lake using easily implemented data science with scaled analytics, you can eliminate blind spots and significantly improve your organization’s cybersecurity framework. We’ll also show you how the SOC can extract the most value from security data, plus we’ll share many more stealth tips for your advantage.

    10:15 am
    Threat Researcher's Guide to the Threat Landscape
    • session level icon
    speaker photo
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    In today’s hyper-connected world, the digital landscape is constantly evolving, presenting both opportunities and challenges. The Threat Researcher’s Guide to the ThreatLandscape delves into the dynamic realm of cybersecurity threats, providing a comprehensive overview of the latest developments, trends, and insights in the field of threat research. In this talk, Kyle will be exploring the evolving threat landscape and its impact on individuals, businesses and society as a whole. With cyberattacks becoming increasingly sophisticated and persistent, understanding the latest threat vectors and attack techniques is crucial for effective defense and mitigation strategies.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    11:10 am
    [Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital Orchestra
    • session level icon
    Identifying the Current Threat Landscape
    speaker photo
    Solutions Engineer, Okta
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.

    Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.

    Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.

    11:10 am
    Demystifying External Exposure Management
    • session level icon
    speaker photo
    Chief Product Officer, CyCognito
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Organizations are increasingly recognizing that unmanaged or under-managed, exposed assets represent the path of least resistance for attackers to execute successful attacks. Yet, the typical G2K organization is unaware of between one to two thirds of exposed assets. Moreover, these assets, which may include business critical web apps with PII data are rarely if ever tested for security vulnerabilities. The combination of unknown exposed assets and inadequate testing with the reality of siloed security programs is a perfect storm that creates a gaping hole that Gartner suggests organizations address as part of an External Exposure Management program. Join this session to learn more about the state of exposure management; it’s key challenges and effective solutions.

    12:00 pm
    [Lunch Keynote] The Dark Side of AI: Unleashing the Power of HackGPT—Your Worst Nightmare Come to Life
    • session level icon
    speaker photo
    Hacker & Founder, SecKC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Welcome to the most cutting-edge, fear-inducing presentation on the dark side of AI. This presentation will take you on a heart-pumping journey into the world of hacking using the power of AI. Our presenter, a self-proclaimed hacker, will share his personal experiences and the latest advancements in ChatGPT technology that will leave you on the edge of your seat. Don’t miss out on this incredible opportunity to explore the dangerous world of AI-powered hacking. But beware: we only want attendees who are not afraid of the dark and who have a deep curiosity for the unknown.

    Attendees will leave with a newfound understanding of the immense power and danger of AI in the world of hacking, and the dire need for heightened cybersecurity measures.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    speaker photo
    Adjunct Professor, Washington University
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Advisory Council – VIP / INVITE ONLY

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    [Panel] Navigating the Cybersecurity Symphony in the Age of AI
    • session level icon
    Understanding and Theorizing the Future of Generative AI
    speaker photo
    Americas Mandiant Principal Architect, Mandiant, now part of Google Cloud
    speaker photo
    Director, IT Software Engineering, DIRECTV
    speaker photo
    Director, IT Security, Caleres, Inc.
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Generative AI, such as ChatGPT and Bard, has incredible potential, but it also brings certain negative elements and concerns for everyone. It is important to address these concerns to ensure responsible and ethical use of AI technology, especially within cybersecurity. This panel covers insider threats, lack of accountability, cybersecurity vulnerabilities, fake data and data privacy, human replacement concerns, and ethical misuse.

    By understanding these fears and proactively addressing them through responsible development, robust safeguards, and ongoing monitoring, we can harness the potential of generative AI while mitigating its associated risks. Collaboration between AI researchers, policymakers, and industry professionals is essential to ensure that generative AI technology is developed and deployed in a manner that aligns with ethical standards and human values. Hear from experts in the field on how they’re trying to navigate this new song and dance with AI, what we can expect in the near and distant future, and what it takes to provide the support DevOps teams need.

    1:15 pm
    Supporting Victims of Cybercrime: The Cyber Helpline
    • session level icon
    speaker photo
    Director & Helpline Manager, The Cyber Helpline
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    The Cyber Helpline is a U.K. charity that supports over 2,000 victims of cybercrime every month by linking them with cybersecurity experts for free, professional help. The charity are delighted to be launching a pilot in the U.S. and to bring with them a wealth of expertise and knowledge to address a major gap and cybersecurity challenge in the States. Cybersecurity professionals are best placed to fill the gap in support for individuals experiencing cybercrime, but the impact, trends and the importance of giving safe advice means that it differs from “traditional” cybersecurity. Individuals facing cybercrime face unique challenges and require tailored support and expertise, which isn’t always available. This presentation provides an insight into the threats facing individuals in the online space, the impact it has on them, why the advice that you might give your friends and family could be inadvertently dangerous and how you can use your expertise and resources to make a difference in peoples lives with the skills you have, just by learning to apply them to a different audience. The session will allow for a Q&A to provide attendees with the chance to ask questions and understand more about this emerging career pathway and opportunities and responsibilities that their organizations have to support victims of cybercrime.
    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:30 pm
    [Panel] Guardians of the Vault: Cybersecurity Strategies from Financial Sector Titans
    • session level icon
    speaker photo
    CISO & SVP, First Bank
    speaker photo
    Deputy CISO, FNBO Bank
    speaker photo
    Supervisory Cybersecurity Analyst, Federal Reserve Board
    speaker photo
    Sr. Director, BISO, Equifax
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Delve into the realm of financial cybersecurity as industry leaders take the stage to share their cutting-edge strategies for threat intelligence and best practices employed to safeguard sensitive data, fortify defenses, and stay steps ahead of cyber threats in a modern world.
    2:30 pm
    Shifting from Static Defense to Live Reponse
    • session level icon
    speaker photo
    Senior Solution Engineer, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    The rise in attacks leveraging exploits that result in attackers living off the lands has marginalized not only signature-based solutions, but many adaptive and “next gen” technologies as well. These attacks necessitate operational live incident response to not only detect, but to contain, eradicate, and recover. How does this change the composition of a SOC or CIERT, and what does a successful small team look like?

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    Your Career in Cybersecurity
    • session level icon
    speaker photo
    Author, "Break In Cyber," vCISO
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm

    Whether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you “level up” in your career. This sessions will cover:

    • Best ways to achieve career growth
    • Education (certifications or on-the-job experience?)
    • Short-term career planning
    • Long-term career planning
    • Different paths in cybersecurity (Red Team, Blue Team, GRC, and more)

    Even if you are satisfied in your current role, learn how to make yourself “recession proof.”

    3:45 pm
    (ISC)2 St. Louis Chapter Meeting
    • session level icon
    Open to all attendees
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:15 pm

    Session description coming soon.

    3:45 pm
    InfraGard Chapter Meeting
    Open to all attendees
    Registration Level:
    3:45 pm - 4:15 pm

    Discussion topic and agenda TBD.

Exhibitors
  • Arista Networks
    Booth: 330

    Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.

  • Cloud Security Alliance St. Louis Chapter
    Booth: TBD
  • Critical Start
    Booth: 120

    Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.

  • CyCognito
    Booth: 440

    CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn’t even know existed. Welcome to the Shadow Risk Revolution.

  • DirSec
    Booth: 130

    Dirsec is a value added reseller specializing in cyber security. Established in 2001 and headquartered in Broomfield, CO, we partner with over 30 different vendor technologies to tackle your I.T. security challenges and protect your business systems and data. We are proud to support clients from large enterprise to government and schools, with representatives who have the knowledge to support all your specialized business needs.

  • Exabeam
    Booth: 300

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • IEEE
    Booth: TBD

    IEEE (Institute of Electrical and Electronics Engineers) is the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities. IEEE is the trusted “voice” for engineering, computing and technology information around the globe. There are more than 421,000 IEEE members in more than 160 countries. The IEEE publishes a third of the world’s technical literature in electrical engineering, computer science and electronics and is a leading developer of international standards that underpin many of today’s telecommunications, information technology and power generation products and services.

  • Illumio
    Booth: 100

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA St. Louis
    Booth: TBD

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

    Meetings are generally held the 3rd Wednesday of the month between September and May.

  • ISC2 St. Louis Chapter
    Booth: TBD

    As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.

  • Mandiant, now part of Google Cloud
    Booth: 310

    Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

  • Okta
    Booth: 410

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • One Identity
    Booth: TBD

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

  • Palo Alto Networks
    Booth: 400

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Recorded Future
    Booth: 420

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • SentinelOne
    Booth: 200

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • St. Louis University, Workforce Center
    Booth: 450

    The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber SecurityProject ManagementAgileAnalyticsSoftware Engineering and more.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: 320

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Varonis Systems, Inc.
    Booth: 140

    Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

  • WiCyS St. Louis Metropolitan Affiliate
    Booth: TBD
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    John DiMaria
    STAR Program Director, Cloud Security Alliance

    John DiMaria has 30 years of successful experience in Standards and management System Development, including Information Systems, Business Continuity and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, a working group member and key contributor to the NIST Cybersecurity Framework. He currently manages all facets of the CSA STAR Program which includes security, privacy, continuous monitoring and development of new solutions.

  • speaker photo
    James Norberg, Moderator
    VP Segment & Technology Product Security, Humana

    James Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Currently James and his family reside in the St. Louis area.

  • speaker photo
    Zachary Lewis
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis

    Zach Lewis serves as the CIO and CISO for the University of Health Sciences and Pharmacy. He handles IT Strategic Planning, Cyber and Physical Security, Enterprise Risk Management, Infrastructure Management, IT Governance and Compliance, and day-to-day technology leadership. He volunteers on IT advisory boards for SIUE and UMSL and is an officer in the St. Louis Chapter of InfraGard.

    Zach holds a CISSP, CRISC, CISM, CISA, and CGEIT, as well as numerous other IT certifications. He was a recipient of Cyber Defense Magazine’s Top Global CISOs of 2022. Zach provides his industry expertise by speaking at conferences, webinars, and schools throughout the country.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Doug Menendez, Moderator
    Instructor - Cybersecurity, Webster University

    After retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).

    Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniques using a variety of delivery modalities. Working to promote diversity, equity and inclusion in the cybersecurity space and committed to providing a powerful, transformative student experience. Passionately advancing the next generation of cybersecurity, IT audit and risk management professionals.

    He is on the Board of Directors of CyberUp, A St. Louis-based nonprofit organization that focuses on cybersecurity apprenticeships and youth education programs. Doug is also on the Executive Committee of GHECC, the Gateway Higher Education Cybersecurity Consortium. He holds an MBA from Saint Louis University, and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Bob Reny
    Sales CTO & Principal Systems Engineer, Exabeam

    Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network access control and end point security architecture. Large program security include zero trust, Operational Architecture safety/security. His expertise has supported customer organizations public and private. This covers scaling for many large federal agencies, global 1000 companies in many business verticals across finance, utilities, service, and technology. Bob has been a CISSP for the past almost 22 years and continues to help organizations evaluate the broad security policy to streamline Security Operations Center activities. This includes improving cross-functional processes for change management, incident response, event escalation, and response.

  • speaker photo
    Kyle Wilhoit
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks

    Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world-renowned threat researchers that identify, track and unearth technical intelligence related to actor groups present in hack tools, attack frameworks, targeted attack campaigns, and malware families.

  • speaker photo
    Armando Aguilar
    Solutions Engineer, Okta
  • speaker photo
    Panel Discussion
  • speaker photo
    Ansh Patnaik
    Chief Product Officer, CyCognito

    Ansh Patnaik, Chief Product Officer, has over 20 years of cross functional experience in cybersecurity and data analytics. Most recently, Ansh was Director, Cloud Security Products for Google Cloud Platform, and Chief Product Officer for Chronicle, prior to the acquisition of Chronicle by Google. Previously, he was VP of Product Management at Oracle Cloud where he defined and launched their security analytics cloud service offering. Ansh has held product management, product marketing and sales engineering leadership roles at several market leading software companies including Delphix, ArcSight (acquired by HP), and BindView (acquired by Symantec).

  • speaker photo
    Corian Kennedy
    Hacker & Founder, SecKC

    Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay one step ahead of cybercriminals. With a current role in advanced research and hacking for one of the most prominent cybersecurity firms in the world, Corian has helped shape the industry's future and continues to push the limits of what is possible in the field of cybersecurity.

  • speaker photo
    Andrew Wilder, Moderator
    Adjunct Professor, Washington University

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.

  • speaker photo
    Tim Gallo
    Americas Mandiant Principal Architect, Mandiant, now part of Google Cloud

    Tim Gallo leads the Americas Mandiant Principal Architect team covering Mandiant solutions including Cyber Threat Intelligence, traditional Intelligence Operations, Managed Detection and Response, Security Controls Validation, and Attack Surface Management and asset discovery. He joined Google Cloud through the acquisition of Mandiant by Google in 2022; he had spent five years at Mandiant prior to the acquisition in a variety of field facing roles covering the aforementioned topics.

    Before joining Mandiant, Tim leveraged his over 20 years’ experience in information security and intelligence operations to aid in the development and deployment of a number of solutions. Including building client and organizational expertise in Intelligence Guided Cyber Network Defense (IGCND). This included the development and product management of some of the first cyber intelligence solutions ever brought to market. These solutions have included threat and vulnerability management tools, IOC prediction algorithms, intelligence services, and strategic intelligence consulting.

    Today, he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective security processes and operations and helping clients and vendors find ways to leverage technologies responsibly to build their cyber defense centers and security operations practices. Every once in a while, he can be found out in the desert, sometimes on his Harley with a flamethrower, sometimes with just a flamethrower.

  • speaker photo
    Tina Lampe
    Director, IT Software Engineering, DIRECTV

    Tina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program/Project/Product Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity – Leadership focus from Maryville University in St. Louis, Missouri. Tina is a specialized advocate of Business and Technology Strategies with the ability to provide guidance on balancing cybersecurity risks while enabling business digital transformation. Tina has demonstrated experience leading global teams to successful completion of complex technical software and infrastructure initiatives. Tina also has a proven ability to repair business relationships and to establish rapport with diverse groups, organizational levels and backgrounds.

  • speaker photo
    Tami Spellman, Moderator
    Director, IT Security, Caleres, Inc.

    Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.

  • speaker photo
    Panel Discussion
  • speaker photo
    Charlotte Hooper
    Director & Helpline Manager, The Cyber Helpline
  • speaker photo
    Marc Ashworth
    CISO & SVP, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.

  • speaker photo
    Sara Flores
    Deputy CISO, FNBO Bank
  • speaker photo
    Don Peterson
    Supervisory Cybersecurity Analyst, Federal Reserve Board

    Don Peterson is a Supervisory Cybersecurity Analyst for the Federal Reserve System, based out of the Federal Reserve Bank- St. Louis. He is tasked with overseeing the supervision of the largest and most systemically important financial institutions in the United States with assets of $100B+. His duties also include participating in the development of Federal Reserve and international cybersecurity policy and guidance. He sits on multiple System steering groups involving cybersecurity, technology, and intelligence within the Federal Reserve.

    His past roles in technology and security span several sectors including Technology, Law Enforcement, Medical, and Higher Education. His research has involved Automated Machine Translation (AMT) of Arabic dialects to English and counterintelligence involving extremist groups. He is a member of several industry groups that include InfraGard, ECTF, Cloud Security Alliance, OWASP, and the IEEE. He holds several certifications and a Master’s of Cybersecurity Management (MSCM) from the McKelvey School of Engineering at Washington University in St. Louis.

  • speaker photo
    Michelle Sickbert
    Sr. Director, BISO, Equifax

    Michelle is the Business Information Security Officer.

  • speaker photo
    Shane Harsch
    Senior Solution Engineer, SentinelOne

    Shane Harsch is an Information Security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers and is a commissioned officer in the US Army, Military Intelligence. Shane holds degrees in business (MBA) and computational linguistics (BA), and maintains the following certifications: Intrusion Analyst (GCIA), Incident Handling (GCIH), Enterprise Defense (GCED), Information Security (CISSP), and Threat Intelligence Analyst (CTIA). In addition to his responsibilities as a Senior Solution Engineer at SentinelOne, Shane fosters new professionals to information security as a SANS Instructor and an Adjunt Instructor for the University of Michigan.

  • speaker photo
    Mike Miller
    Author, "Break In Cyber," vCISO

    Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For over 25 years, Mike has specialized in both offensive and defensive cybersecurity, and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Grow in person!

Join your regional cybersecurity community for learning and professional growth. Sign up today!