googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 25, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Ambassador

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, September 26, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Breakfast Roundtable (VIP / Invite Only)
    • session level icon
    CISOs Under Fire
    speaker photo
    Global Cybersecurity Senior Manager, Mars
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: The Wine Room

    In an era where cyber threats are escalating and the legal landscape is becoming increasingly complex, Chief Information Security Officers (CISOs) find themselves at the frontline of their organization’s defense. This closed-door discussion aims to address critical questions such as:

    • What are you doing to protect your company and yourself from some of the risks and legal liabilities?
    • Do you have Board insurance?
    • Do you have personal insurance?
    • Has this changed how you interact with other leaders and the board?

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Are You in a Dysfunctional Relationship with the HR Department?
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Consulate

    When HR and security teams understand their respective roles, value each other, and have an open, productive partnership, life is good. They can help each other be more effective and complement each other’s functions. Unfortunately, that symbiotic state can be hard to achieve. For security teams, HR folks can be hard to understand. Sometimes they seem like a great advocate for security, and at other times they can seem more like a blocker of our efforts to better secure the organization.

    For HR professionals, dealing with the security team can be a challenge. For example, the security team might send out an emotionally-triggering simulated phish to everyone in the organization, causing numerous employee complaints that HR has to manage. So what can you do if you don’t have the best relationship with the HR team?

    This talk, based on years of experience navigating the relationship between HR and security teams, will cover the issues that cause the biggest disconnects between HR and security. We’ll look at the issues from both sides and cover proposed solutions for each. Improving the relationships for both departments can lead to happier HR and security professionals who are more effective in their roles, and a company that’s better protected and prepared against cyber threats.

    8:00 am
    WiCys Chapter Meeting - Cybersecurity Awareness Month: Engagement Strategies
    • session level icon
    Open to all attendees
    speaker photo
    Cyber Talent Director, Mastercard; Secretary & Founder, WiCyS St. Louis Metro
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Ambassador Room
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Securing the Vote: Challenges and Innovations in Election Security
    • session level icon
    speaker photo
    Director of Elections, Saint Louis County Election Board
    speaker photo
    Cybersecurity Advisor and Coordinator for Missouri, DHS CISA
    speaker photo
    Director of Elections, State of Missouri
    speaker photo
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    In an era where digital threats loom large, ensuring the integrity and security of elections is paramount. This panel brings together leading experts in cybersecurity, election administration, and policy to discuss the multifaceted challenges of protecting our democratic processes. From cyberattacks and misinformation campaigns to safeguarding voter data and ensuring transparency, our panelists will explore the latest innovations and strategies in election security. Attendees will gain insights into the evolving threat landscape, the role of technology in securing elections, and collaborative approaches to building resilient electoral systems. Join us for a critical conversation on preserving the cornerstone of democracy in the digital age.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Implementing a Secure IT & OT Security Footprint and Network Visibility
    • session level icon
    speaker photo
    Global Sr. Manager, Information Security, Olin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Consulate

    NIST + CIS controls is an excellent security model your company can use to ensure it considers the appropriate security strategies and implements the necessary toolsets to achieve a highly secured IT and OT security footprint. Come join this discussion to learn how to implement this model, what the strategy, map, and approach look like to achieve this level of control and compliance, learn why IT and OT (Business and Operational/Production networks) security are critical, understand why network visibility is essential, and considerations in choosing the appropriate network visibility platform.

    10:15 am
    What to Do When SaaS Security Fails
    • session level icon
    speaker photo
    Deputy CISO, Centene
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Amphitheater

    Session description coming soon.

    10:15 am
    The Future of Cybersecurity Is Autonomous
    • session level icon
    speaker photo
    Sr. Manager, Data Solutions Engineering, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Ambassador

    Security professionals face ever-increasing challenges. From the changing landscape of attacks to defensive tools and workforce shortages, cybersecurity has already begun a drastic transformation. We examine how AI and automation streamline processes and tasks at scale to defeat next-generation attack vectors and uplevel security operations, services and business models.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Social Engineering: Training the Human Firewall
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Consulate

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    11:10 am
    Leveraging Generative AI to Automate Source Code Inspection
    • session level icon
    speaker photo
    Principal Product Security Architect, Bayer
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Ambassador
    While recent advancements in large language models (LLMs) have paved the way for options that are more adept at analyzing source code and providing tailored remediation advice, the current options available to security professionals and software engineers involve time consuming techniques and risk missing areas of code. Additionally, an organization’s legacy applications may not be slated for manual review any time soon.
    This talk presents a new approach that automates the process, performs holistic inspection, and greatly increases the speed of producing findings for red teams, blue teams, and security engineers.
    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Vice President, Savvy
    speaker photo
    Solutions Architect, Aqua Security
    speaker photo
    CISO in Residence, Zscaler
    speaker photo
    Director of Information Security, Shelter Insurance
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Amphitheater

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] Your Success Is in YOU!
    • session level icon
    speaker photo
    Speaker, Author & Career Strategist, CAREERCompass, LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Today, studies show an increasing number of professionals feel bored, burned out, or frustrated when it comes to their career. Whether they struggle with uncertainty regarding their career direction, lack the knowledge needed to successfully navigate their work environment, or the loss of empowerment to make the best career choices for themselves, many want answers to improve their future, but aren’t sure of how to get them.

    In this talk, Bernie Frazier, SPHR, shares insights regarding principles often overlooked and unaddressed by professionals which prevent many of them from experiencing the career success and fulfillment they desire. By
    understanding and adopting these powerful principles, these same professionals can begin to see a transformation in their career which can result in a lasting, positive impact on their organization’s and their own success!

    12:00 pm
    Advisory Council Lunch Roundtable (VIP / Invite Only)
    • session level icon
    AI Governance and Risk Management
    speaker photo
    Adjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: The Wine Room
    AI is transforming cybersecurity, but it also introduces new risks. I’d like to explore how organizations can implement effective AI governance frameworks that ensure ethical use, transparency, and regulatory compliance. This topic would also cover AI risk management, particularly how to safeguard against AI-driven attacks and the integration of AI into cybersecurity operations. Given the regulatory landscape, we could discuss compliance with emerging AI regulations and how to prepare for the evolving expectations around AI use in security.
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Securing the Enterprise in the Age of AI: An Interesting Conundrum
    • session level icon
    speaker photo
    Director, IT Software Engineering, DIRECTV
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Ambassador

    The explosion of AI usage within enterprises has introduced threats and opportunities to the organization’s security posture. In this discussion, we will cover managing enterprise AI risks, enhancing cyber defenses using AI, enhancing the security team impact through AI, and a future-focused view of challenging issues in which AI may provide some relief.

    Key takeaways include AI governance guidance, tips for building your security team, and tips for empowering responsible security and AI advocates within other organizations.

    1:15 pm
    Building a Skills-Based Hiring Model for the Future
    • session level icon
    speaker photo
    Executive Director, CyberUp
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Consulate
    Developing a strong pipeline of cybersecurity talent is critical for organizations seeking to protect themselves in an increasingly complex threat landscape. This session will explore innovative approaches to building a skilled, diverse cybersecurity workforce including through education pathways, upskilling programs, apprenticeships, diversity initiatives, and public-private partnerships.
    1:15 pm
    How Do We Solve the Human Problem of Cybercrime?
    • session level icon
    speaker photo
    TEDx and Cybersecurity Technology Speaker
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Amphitheater

    Have you ever wondered why cybercriminals seem one step ahead of your organization? Your workforce is falling for a variety of schemes; some are the same old, traditional scams, and AI fuels others. Let’s take a deep dive into the world of cybercrime, where we’ll uncover the human factors that make your staff vulnerable. From the psychology of hackers to the everyday mistakes we all make, this talk will explore the fascinating interplay between human behavior and cybersecurity. This session promises to be enlightening and entertaining. Let’s turn the tables on cybercrime together!

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Building a Cybersmart Culture Through Ambassadorship: A Grassroots Effort
    • session level icon
    speaker photo
    Head of Cybersecurity, Nestlé Purina North America
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Consulate

    This session will empower you to develop a secure organizational culture. Gain invaluable insights on how to build a robust cybersecurity ambassador program from the ground up, tailored to your organization’s specific needs and goals. Discover effective strategies to customize awareness campaigns that resonate with your workforce, fostering a culture of vigilance and responsibility. Learn how to leverage the available tools to enhance your organization’s cybersecurity posture. Don’t miss this opportunity to create a secure environment and safeguard your organization’s valuable assets. Together, let’s build a culture where cybersecurity is everyone’s responsibility.

    2:10 pm
    Understanding What DevSecOps Really Is
    • session level icon
    speaker photo
    DevSecOps Engineer, Lockheed Martin
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Ambassador

    Session description coming soon.

    2:10 pm
    InfraGard Chapter Meeting [Open to all attendees]
    • session level icon
    DPRK Targets Hospitals to Fund Espionage
    speaker photo
    Supervisory Special Agent, FBI
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Amphitheater

    Join us for a critical InfraGard Chapter Meeting at SecureWorld St. Louis, where an FBI Supervisory Special Agent will delve into the alarming trend of cyberattacks on hospitals orchestrated by the Democratic People’s Republic of Korea (DPRK). This session will explore how these cybercriminals are targeting healthcare institutions to fund espionage activities. Gain insights into the tactics, techniques, and procedures (TTPs) used by these threat actors, understand the implications for the healthcare sector, and learn how to fortify your organization’s defenses against such sophisticated attacks. Don’t miss this opportunity to hear directly from a leading expert in the field and engage in a vital discussion on protecting critical infrastructure from state-sponsored cyber threats.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    3:30 pm
    [Closing Keynote] Beyond the Single Point of Failure
    • session level icon
    Lessons from Recent Vendor Incidents and Strategies for Resilience
    speaker photo
    VP, CISO, Enterprise Mobility
    speaker photo
    SVP, CISO, Humana
    speaker photo
    VP, Global Cybersecurity and Privacy Risk Management, Reinsurance Group of America
    speaker photo
    CISO & SVP, First Bank
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    Recent incidents involving major cybersecurity vendors like CrowdStrike and Microsoft have highlighted the critical issue of single-point failures in our digital defense ecosystems. This panel session delves into the aftermath of these events and explores the broader implications for organizational cybersecurity strategies. Our expert panel discusses:

    • The dangers of over-reliance on single vendors: Explore the risks of putting all your security eggs in one basket.
    • Developing a multi-vendor strategy: Balancing the benefits of integrated solutions with the need for redundancy and resilience.
    • Incident response planning: Preparing for vendor-related outages or failures as part of your cybersecurity strategy.
    • Future outlook: How the industry might evolve to address these challenges.

    Gain valuable insights into creating more resilient security architectures that can withstand vendor-specific incidents.

Exhibitors
  • Alecto Networks
    Booth: 150

    Alecto Networks is a trusted leader in network security solutions with a legacy spanning over 30 years. Formerly known as Enterprise Consulting Group, our rebranding to Alecto Networks reflects our commitment to innovation and excellence in cybersecurity.

  • Aqua Security
    Booth: 250

    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

  • Armis, Inc
    Booth: 210

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Cloud Security Alliance St. Louis Chapter
    Booth: n/a
  • Fortra
    Booth: 200

    HelpSystems has long been known for helping organizations become more secure and autonomous. However, over the years, our customers have shared with us that it has gotten harder and harder to protect their data. As technology plays an increasingly important role in the way organizations operate, cyberthreats are evolving to become more powerful than ever before. If there’s one thing we’ve learned from being in an industry where the only constant is change, it’s that being adaptable is the best way to grow in the right direction. So we’ve listened to our customers’ concerns, problem-solved, and delivered with impressive results. Consequently, we’re a different company today — one that is tackling cybersecurity head-on.

    That’s why HelpSystems is now Fortra, your cybersecurity ally. We’re bringing the same people-first support and best-in-class portfolio that you’ve come to expect from HelpSystems, only now we’re unified through the mission of providing solutions to organizations’ seemingly unsolvable cybersecurity problems. We offer leading solutions like data security, infrastructure protection, managed services, and threat research and intelligence. Throughout every step of our customers’ journeys, our experts are determined to help increase security maturity while decreasing the operational burden that comes with it. Because our team puts the same level of care into protecting our customers’ peace of mind as their precious data.

    We’re driven by the belief that nothing is unsolvable.
    We’re tenacious in our pursuit of a better future for cybersecurity.
    We are Fortra.

  • Halcyon, Inc
    Booth: 205

    Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. Halcyon’s core platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes. To learn more and get a demo, contact us today.

  • Illumio
    Booth: 120

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InfraGard St. Louis Members Alliance
    Booth: 290

    InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.

  • ISACA St. Louis
    Booth: 100

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

    Meetings are generally held the 3rd Wednesday of the month between September and May.

  • ISC2 St. Louis Chapter
    Booth: 130

    As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.

  • Keysight
    Booth: 400

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • National Cybersecurity Alliance
    Booth: 155

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Pentera
    Booth: 230

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.

    Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.

  • Saint Louis University Workforce Center
    Booth: 450

    The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber SecurityProject ManagementAgileAnalyticsSoftware Engineering and more.

  • Savvy Security
    Booth: 280

    Savvy automatically discovers and remediates your most toxic combinations of SaaS identity risk. It also allows you to guide users at scale towards proper security hygiene using just-in-time security guardrails.

  • SentinelOne
    Booth: 440

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • WiCyS St. Louis Metropolitan Affiliate
    Booth: 160
  • Zscaler
    Booth: 425

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Brian Lourie, Moderator
    Global Cybersecurity Senior Manager, Mars

    Brian supports a wide variety of business units like Mars Wrigley, Kind, VetSource, and Blue Pearl, to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a board member on the St. Louis Scott/AirForce ISC2 regional chapter and was president for three of those years. Brian is also a member of InfraGard and the St. Louis FBI citizens academy.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Katie Boudreau, Moderator
    Cyber Talent Director, Mastercard; Secretary & Founder, WiCyS St. Louis Metro
  • speaker photo
    Eric Fey
    Director of Elections, Saint Louis County Election Board

    Eric is a lifelong St. Louisan and has been serving as the Democratic Director of Elections in St. Louis County since 2015. Eric received a BA in Political Science from Webster University and a MPPA (Public Policy Administration) from the University of Missouri St. Louis. Eric’s professional life has been devoted to public service, having worked in various roles in the field of public administration since graduating from college. As a matter of fact, Eric’s first foray into the field was serving as an election judge at the age of 19 while still in college. After an initial stint with the St. Louis County Board of Elections, Eric worked as an administrative assistant for the St. Louis County Council for four years prior to his tenure as Director of Elections.

    Eric currently serves as President of the Missouri Association of County Clerks and Election Authorities (MACCEA) and Secretary of the International Association of Government Officials (IGO). In those roles Eric is primarily responsible for organizing professional development opportunities for fellow election administrators. Additionally, Eric serves as co-chair of the MACCEA legislative committee which entails legislative advocacy on behalf of MACCEA and frequent testimony in relevant committees regarding legislation pertinent to election administration.

    Not only is election administration Eric’s occupation, but it’s also a labor of love. In 2021 Eric began co-hosting an election administration focused podcast called “High Turnout Wide Margins” along with Boone County Clerk Brianna Lennon. The purpose of the podcast is to create a forum for election administrators to share their experiences and professional accomplishments. In 2022 Brianna and Eric received a philanthropic grant to support the podcast. With this support Brianna and Eric traveled to the national conference of the Election Center where they interviewed election officials from across the country on the significant challenges facing the field of election administration. As the challenges facing election administration aren’t just domestic, Brianna and Eric traveled to Moldova and Hungary in 2022 to interview election officials in those countries about running elections in often under resourced and conflict prone situations. High Turnout Wide Margins just finished its second season after posting its 86th episode.

    In his free time Eric enjoys volunteering to serve on international election observation missions. As a volunteer, Eric has observed elections in 12 countries. Eric’s most enjoyable activity, however, is spending time with his wife and two children.

  • speaker photo
    Robert Graham
    Cybersecurity Advisor and Coordinator for Missouri, DHS CISA

    Mr. Graham serves as a Cybersecurity Advisor and Cybersecurity Coordinator for Missouri. Currently, based in Columbia, MO he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.

    His programs coordinate cyber preparedness, risk mitigation and incident response. He provides Cybersecurity resource briefings, Cybersecurity assessments, and Incident Response planning to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

    Prior to joining CISA, Mr. Graham worked for Southwestern Power Administration (SWPA), one of four Power Marketing Administrations under the Department of Energy. While at SWPA, Mr. Graham served as the senior Information Security Officer, acting Chief Information Security Officer and as a Responsible Subject Matter Expert for both Supervisory Control and Data Acquisition (SCADA) and Operational Technology (OT) systems for the North American Energy Reliability Corporation (NERC) Critical Infrastructure Protection requirements.

    Prior to working for the Department of Energy, Mr. Graham worked in the Insurance industry as a Networking and Telecommunications Technician, Security Administrator, Senior Security Administrator,
    and Chief Information Security Officer.

    Mr. Graham spent 12 years active duty with the United States Air Force supporting the National Emergency Airborne Command Post (NEACP), the Strategic Air Command (SAC) Airborne Command Post (Looking Glass) and the B-2 Stealth Bomber. In addition, Mr. Graham served as an Air Force Technical Training Instructor for Aircraft Electrical Environmental Systems

  • speaker photo
    Chrissy Peters
    Director of Elections, State of Missouri

    Chrissy Peters is the Director of Elections for the State of Missouri. She has spent the majority of her professional career in state government and public service. She has worked at the Secretary of State’s office in the Elections Division for 16 years.

  • speaker photo
    Zachary Lewis, Moderator
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis

    Zach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving strategic growth. His leadership in negotiating vendor contracts, managing multi-million-dollar budgets, and chairing the Enterprise Risk Management Committee has resulted in substantial cost savings and operational efficiencies.

    With a focus on aligning IT strategies with organizational goals, Zach has led successful cloud migrations, implemented robust cybersecurity measures, and established a culture of transparency and collaboration. His expertise extends to compliance with GLBA and FERPA regulations, managing cybersecurity training programs, and optimizing network infrastructure. Zach's passion for innovation, user-centric approach, and ability to build cross-functional teams have been instrumental in driving organizational success, enhancing cybersecurity defenses, and positioning the institution as a leader in health education and operational excellence.

    Zach is a 2X recipient of Cyber Defense Magazine’s Top Global CISOs, was named 40 Under 40 Security Leaders by CDO Magazine, and was St. Louis Non-Profit CISO of the Year. He’s a recent graduate of the FBI CISO Academy. Zach provides his industry expertise to others by speaking at conferences, webinars, and universities throughout the country.

  • speaker photo
    Mike Ehlers
    Global Sr. Manager, Information Security, Olin

    Senior cybersecurity professional with years of experience (Engineer/Architect, Senior Manager, Director, and CISO roles) architecting and managing large scale IT Security, Network Infrastructure, and Development projects. Heavy experience collaborating with diverse cross-functional groups of people, both domestic and international. Recognized for building products, platforms, and IT teams from the ground up along with developing and implementing IT and OT (cyber) security standards, processes, and initiatives with high dollar impact, reduced costs, lower risk, increased revenue, and high customer satisfaction.

  • speaker photo
    Tony Masgio
    Deputy CISO, Centene
  • speaker photo
    Mike McGrail
    Sr. Manager, Data Solutions Engineering, SentinelOne

    Mike McGrail leads SentinelOne's data solutions engineering team, focused on using data to uplevel the security posture of customers moving on from legacy SIEM troubles.
    After over a decade as a practitioner in the insurance industry, he moved to the vendor space to help more customers solve similar problems. Mike holds a master's degree in computer science from Georgia Tech and resides near Toronto, Ontario.

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Bill Horn
    Principal Product Security Architect, Bayer

    Bill is an IT professional with over 20 years of experience driving DevOps, secure SDLC, cloud security, and security architecture initiatives. Holding both a Bachelor's and Master's degree in Cybersecurity and Information Assurance, he brings a strong academic foundation to his work. Bill's certification portfolio includes CISSP and GWAPT, among others. As a recognized expert, he regularly shares his insights as a presenter at his company's Security Champions speaker series.

  • speaker photo
    Debra Brown
    Vice President, Savvy

    Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate learner, book lover, and a devoted mother and wife in a loving, blended family.

  • speaker photo
    Minhal Gardezi
    Solutions Architect, Aqua Security

    Minhal Gardezi is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past three years. With a robust background in computer science, Minhal earned his Bachelor of Arts in Computer Science from Case Western Reserve University. His role at Aqua Security involves designing and implementing cutting-edge security solutions, leveraging his expertise to address complex challenges in the ever-evolving field of cloud native security. Minhal's blend of technical acumen and innovative problem-solving makes him a valuable asset to his team and a trusted advisor to clients seeking to safeguard their cloud environments.

  • speaker photo
    Yiannis Vassiliades
    CISO in Residence, Zscaler

    Yiannis Vassiliades is currently serving as CISO in Residence at Zscaler, the global leader in Secure Access Service Edge (SASE) and Zero Trust IT Transformation. With over 25 years of experience in cybersecurity, Yiannis has been deeply committed to productizing transformative technologies that align with organizations’ strategic cybersecurity and risk objectives. He began his career specializing in Resilience and Disaster Recovery before diversifying his expertise to encompass various cybersecurity domains such as Security Analytics, Data Protection, Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Cyber Risk Management. Yiannis has held leadership roles in prominent enterprises including IBM, Raytheon, and CA Technologies (acquired by Broadcom), as well as contributing to the growth of emerging companies from their seed stages to acquisition. Prior to joining Zscaler, Yiannis served as the Chief Product Officer at Ostrich Cyber-Risk, where he spearheaded the development and launch of cyber risk quantification solutions. Before that, he played a founding role in establishing and expanding the MDR division at Sophos, which has since become the largest MDR service provider with over 20,000 customers. Yiannis holds a Bachelor of Science in Information Systems from University of Maryland and earned his MBA from Johns Hopkins University.

  • speaker photo
    Travis Nichols, Moderator
    Director of Information Security, Shelter Insurance

    Travis Nichols is a seasoned leader in Information Security at Shelter Insurance, where he spearheads the safeguarding the organization’s digital assets. With a robust background in software development, cybersecurity, and management, Travis has consistently demonstrated his commitment to excellence and innovation. His journey is marked by a relentless pursuit of knowledge and dedication to fostering a culture of continuous improvement and learning, both within his team and the broader community. Travis’s leadership philosophy centers on growth, value creation, and enhancing the lives of those around him, including his wife and two grown children. Through his strategic vision and passion for leadership, Travis continues to drive impactful change and inspire those he leads. One of his favorite questions to ask is: “How can I help you be your best?”

  • speaker photo
    Bernie Frazier, SPHR
    Speaker, Author & Career Strategist, CAREERCompass, LLC

    Author of the highly acclaimed book, “Your Success is in YOU!: Empowering and Equipping You to Create Your Best Career Ever!”, Bernie Frazier, SPHR, is an author, speaker, career coach/strategist, and talent acquisition expert whose mission is to help people overcome barriers to create greater career success. Bernie has over 30 years of experience in the corporate recruiting space, has served as keynote speaker for Fortune 500 corporations and organizations, and coached clients globally from C-Suite executives to individual contributors. She has also served as the “Career Coach” on KSDK’s Today in St. Louis – the St. Louis NBC affiliate, shared timeless job search tips on SiriusXM and KTRS 550 AM radio in St. Louis, been featured in the New York Times and St. Louis American newspapers, and profiled in the St. Louis Business Journal.

    To learn more about Bernie, please visit her website at www.CAREERCompassLLC.com.

  • speaker photo
    Renita Rhodes, Moderator
    Adjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University

    Renita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguarding critical information security controls and conducting audits of paramount significance.

    Renita's commitment to knowledge dissemination is evident through her roles as an Adjunct Instructor at Maryville University and Harris-Stowe State University. She imparts her knowledge through various courses, spanning Cyber Law, Policy, and Compliance, Security Information and Event Management, Introduction to Information Security, Applied Programming - Python, Cybersecurity Operations, and Systems Analysis and Design.

    Her academic journey includes a Bachelor's degree in Business Information Systems from Tennessee State University, a Master's degree in Information Management from Washington University in St. Louis, and a Cybersecurity Certificate from Saint Louis University. During her graduate studies, she published a whitepaper titled "Developing Dynamic PeopleSoft Field Security Applications: A PeopleSoft Developer's Guide."

    Beyond her professional and academic achievements, Renita is a passionate cybersecurity awareness and training advocate. She actively engages in various organizations such as the NIST NICE Cybersecurity Careers Ambassadors Program and CyberUp, where she is a Board Member and initiatives that promote diversity, equity, and inclusion in the cybersecurity sector. Renita has also participated as a conference panelist and podcast guest discussing cybersecurity and AI.

  • speaker photo
    Tina Lampe
    Director, IT Software Engineering, DIRECTV

    Tina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity – Leadership focus from Maryville University in St. Louis, Missouri. Tina is a specialized advocate of Business and Technology Strategies including Artificial Intelligence and other emerging technologies. Tina has demonstrated experience leading global teams to successful completion of complex technical software and infrastructure initiatives.

  • speaker photo
    Tony Bryan
    Executive Director, CyberUp

    Tony, CyberUp’s Executive Director, has served the nonprofit community for more than 14 years. He spent nine years serving in the United States Army, where he was known as the youngest Military Police Sergeant in Brigade. Succeeding his time in the Military, Tony was appointed by the Governor of Missouri to serve on the Workforce Development Board and chosen to lead CyberUp. As the Executive Director of a nationally recognized organization, Tony remains passionate for growing apprenticeship opportunities to energize the country’s workforce. He was chosen to serve as the co-chair for the National Initiative for Cybersecurity Education (NICE) Apprenticeship Sub Working Group. Outside of work, you can see Tony adventuring outdoors or playing video games.

  • speaker photo
    Burton Kelso
    TEDx and Cybersecurity Technology Speaker
  • speaker photo
    Heather Reed
    Head of Cybersecurity, Nestlé Purina North America

    Currently heading cybersecurity for Nestlé Purina Petcare North America, Heather Reed has a proven track record of making a positive impact on her organization and those she leads. With more than seven years of experience in security and compliance, she utilizes her unique background in marketing and learning & development to foster a cybersmart culture. Her passion for cybersecurity and dedication to driving tangible results make her an asset in the field.

  • speaker photo
    William Swofford
    DevSecOps Engineer, Lockheed Martin

    Navy Veteran with a current role as a Dev Sec Ops engineer focusing in infrastructure resiliency. Past careers in banking software, web application, and construction worker while through college. (Construction applies more to security than I ever thought) Also love coffee.

  • speaker photo
    Brian Jackson
    Supervisory Special Agent, FBI
  • speaker photo
    Happy Hour
  • speaker photo
    Josh Knopp
    VP, CISO, Enterprise Mobility

    Josh Knopp is Vice President & CISO for Enterprise Mobility. In this role, Knopp is responsible for developing and overseeing the implementation of Enterprise’s global information security strategy in a manner that enables business and reduces friction. Knopp joined Enterprise in April 2016. He has more than 24 years of experience working in in the field of information security.

    Currently, Knopp is a member of the Board of Directors and Executive Committee for the Global Center for Cybersecurity at Cortex, a member of the PCI Security Standards Council’s Board of Advisors, and an adjunct professor at Washington University in St Louis. He completed his Executive MBA from the University of Missouri – Columbia.

  • speaker photo
    Aman Raheja
    SVP, CISO, Humana

    Aman Raheja has been at Humana since 2020. In this role, Aman is transforming the Information Protection program leveraging threat and risk-based approaches. He is building a strong team and proactive culture, while keeping the focus on serving our members and associates.

    Prior to joining Humana, Aman served as Global CISO for BMO Financial Group, one of the top ten banks by asset size in North America, where he led transformative changes that focused on cross-disciplinary resiliency and business enablement capabilities.

    Prior to BMO, Aman orchestrated and executed the Information Security strategy at Express Scripts. Aman also spent over seven years at Citibank, most recently serving as the Group Information Security Officer, leading security programs for CitiMortgage and OneMain Financial.

    Aman serves on the Board of security organizations, ClearData and HITRUST, and is an Advisory Board member for SixThirty Cyber. He has created and shared an open information security strategy framework, B-I-C-T, that balances business value, industry standards, compliance and threat management.

  • speaker photo
    Erica Wilson
    VP, Global Cybersecurity and Privacy Risk Management, Reinsurance Group of America

    Erica Wilson has more than twenty-five years of IT experience, majority of which have been directly in cybersecurity. She has worked in various industries including manufacturing, higher education, financial services and most recently reinsurance. She has served in all capacities of security, including the role of Chief Information Security Officer. Erica is currently the VP of the Global Security Risk Management for RGA. In this role, she serves as a key advisor for the organization regarding cyber and technology risks where she leads a dynamic team of professionals that ensures issues are effectively addressed and managed. Outside of work, Erica is an advocate for helping girls and women explore career options in STEM & Cyber. She is also serves as a Board member for CyberUp.

  • speaker photo
    Marc Ashworth, Moderator
    CISO & SVP, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes