Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, September 16, 2025
    9:00 am
    [PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and Applications
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    AI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.

    Lesson 1: What is Artificial Intelligence?
    Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.

    Lesson 2: What are the AI threats?
    Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.

    Lesson 3: What are the AI vulnerabilities?
    Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.

    Lesson 4: What are AI security controls?
    Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.

    Lesson 5: What is AI risk management?
    Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.

    Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
    One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data Cards

    Lesson 7: What are the AI governance, AI compliance, AI audit requirements?
    Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    Lesson 8: Building an AI security program
    Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.

    Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Wednesday, September 17, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Building Cyber Resilience in a Time of Uncertainty
    speaker photo
    Head of Information Security, Republic Finance
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    As cyber threats evolve and business pressures mount, resilience is no longer just a technical objective—it’s a leadership imperative. In this closed-door roundtable discussion, local Advisory Council members and cybersecurity leaders will share their perspectives on what cyber resilience looks like today and how their organizations are striving to achieve it. From incident response readiness and business continuity planning to workforce stress and supply chain challenges, this open-format session is designed to spark dialogue around the strategies, struggles, and successes that define resilience in the real world.

    8:00 am
    WiCyS St. Louis Metro Chapter Meeting
    • session level icon
    Cracking the Code of Executive Presence: Speak Up, Stand Out, and Lead the Way
    speaker photo
    CIO / CISO, Lite Technology Solutions
    speaker photo
    Sr. Director, BISO, Equifax
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Join Women in CyberSecurity – St. Louis Metro for an insightful morning roundtable where we’ll decode the essentials of executive presence and powerful communication specifically for women in cybersecurity. Learn how to project confidence, articulate your ideas with impact, and strategically navigate conversations to advance your career and influence within the industry. This is your opportunity to gain actionable strategies and connect with peers dedicated to amplifying their leadership voice and leading the way in cyber.
    8:00 am
    Closing the Gaps, Building Resilience: The Missouri Cybersecurity Center of Excellence
    • session level icon
    speaker photo
    Advisory Board Member, Missouri Cybersecurity Center of Excellence
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Cybersecurity challenges don’t just face giant companies; they weigh heavily on schools, small towns, and local businesses. The Missouri Cybersecurity Center of Excellence (MCCoE) was created to address cybersecurity workforce, access, and resilience gaps across the state. In this session, Heather Noggle, MCCoE board member, shares how this new model builds hands-on talent and strengthens community defense, ensuring cybersecurity becomes practical, accessible, and sustainable for organizations of every size.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:15 am
    The Evolution of Agentic AI in Cybersecurity: Threats, Opportunities, Responsible Use, and the Race to Protect
    • session level icon
    speaker photo
    Director, IT Software Engineering, DIRECTV
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    2025 has become the year of Agentic AI. In this session, we will discuss the evolution of threats and opportunities when using AI in Cybersecurity as well as recent Agentic AI Use cases in Cybersecurity and the race to protect our organizations.

    10:15 am
    Once Upon a CMMC: A Compliance Quest for the Defense Industrial Base
    • session level icon
    speaker photo
    DFARS/CMMC Cybersecurity Program Management Office Principal, The Boeing Company
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    In the Defense Industrial Base (DIB), every contractor and supplier plays a role in safeguarding national security—and in this tale, the dragon you must face is noncompliance and not being eligible to win defense contracts. This session takes you on a guided journey through the Cybersecurity Maturity Model Certification (CMMC), exploring the key plot points that defense contractors and their supply chains need to know.
    We’ll unpack the basics of CMMC, dive into the Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS), and map out how to prepare for certification under 32 CFR Part 170. Along the way, we’ll reveal the obligations for both prime contracts and subcontractors under 48 CFR Part 204, offering practical advice to help you avoid pitfalls and achieve a happy ending. Whether you’re a prime contractor, a subcontractor, or somewhere in between, this session will arm you with the knowledge and strategies to ensure your compliance story is a success. A brief Q&A will follow to address your specific challenges.
    10:15 am
    Rethinking Security for the Modern Enterprise: A Strategic Lens for Enterprise Security Professionals
    • session level icon
    speaker photo
    Sr. Solutions Architect, Cybersecurity, C1
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    As digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.

    We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.

    Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.

    Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Exhibitor Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    Personal Resilience: The Missing Link in Cyber Risk Management
    • session level icon
    speaker photo
    CISO, Veterans United Home Loans
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Cybersecurity professionals are trained to manage risk, but what happens when personal resilience is worn thin by the very weight of that responsibility? In this compelling session, we’ll explore how emotional attachment to mission-critical work can erode personal resilience, and why that matters more than ever in today’s high-stakes cyber landscape. Drawing from real-world experience, we’ll examine the hidden costs of burnout and emotional fatigue on risk-based decision making. Attendees will walk away with a fresh perspective on how cultivating personal resilience isn’t just self-care, it’s a strategic imperative for sound cybersecurity leadership.

    11:10 am
    Transforming Security Operations with a Comprehensive Data Fabric
    • session level icon
    speaker photo
    Director of SecOps GTM, Zscaler
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Zscaler has built the world’s largest security cloud in the world, arming us with a comprehensive view of threats, vulnerabilities, policy definitions, and overall risk. To better support our customers’ efforts to improve their posture, we are offering top-tier exposure management and threat defense strategies. This requires the highest quality data with the necessary context to yield powerful insights. In this session, we will break down the methodologies for achieving transformation within proactive and reactive security programs.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Field CISO, Praetorian
    speaker photo
    Sr. Manager, Global Cybersecurity, Mars
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [TableTalks] Connect. Share. Secure.
    • session level icon
    speaker photo
    Global CISO, Barry-Wehmiller
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Skip the PowerPoint and pull up a chair. During this interactive lunch session, you’ll join fellow attendees in small-group tabletop discussions centered on the topics that matter most to you—from AI and cloud security to critical infrastructure, healthcare, and more.

    Each table will feature a dedicated topic with starter questions to guide the conversation. Choose a topic that aligns with your interests and connect with peers who share your challenges, goals, and innovations. Whether you’re a seasoned security leader or early in your cyber career, this is your chance to collaborate, learn, and build relationships in a relaxed, engaging format.

    Networking meets knowledge sharing—see where the conversation takes you.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Sponsored by OneTrust
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Sponsored by:

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    Risk Management: A Modern Cybersecurity Fable
    • session level icon
    speaker photo
    CISO, Navvis Healthcare
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    In every great story, the hero faces challenges, makes pivotal choices, and learns lessons that shape their future. Cybersecurity is no different—our “once upon a time” moments often arrive in the form of evolving risks, shifting priorities, and decisions that can make or break our defenses.

    Join Montez Fitzpatrick, CISO at Navvis Healthcare, for an engaging session that blends real-world experience with practical guidance on identifying, prioritizing, and mitigating cyber risks in today’s complex threat landscape. From balancing security with business needs to understanding the ripple effects of AI, privacy concerns, and network vulnerabilities, this session will help you write the next chapter of your organization’s risk strategy with confidence.

    Whether you’re an emerging professional or a seasoned leader, you’ll walk away with insights you can immediately apply—because in the story of cybersecurity, every decision shapes the ending.

    1:15 pm
    Securing the Hyperconnected World in the AI Era - Everything Needs to MESH
    • session level icon
    speaker photo
    Evangelist, Office of the CTO, Check Point Software Technologies
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

    1:15 pm
    [Panel] Proactive Security: Building Digital Fortresses Against Modern Dragons
    • session level icon
    speaker photo
    CIO & CISO, University of Health Sciences and Pharmacy in St. Louis
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.

    This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.

    Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    Post-Quantum Cryptography Overview: What You Should Do NOW!
    • session level icon
    speaker photo
    Cyber Resiliency, T-Mobile
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Quantum Computing has the potential to render traditional cryptographic systems breakable within the next decade. There are now standards and viable implementations of quantum-resistant cryptographic protocols. That is the first step. The next step is how to assess your organization’s risk and begin the transition to Post-Quantum Cryptography (PQC). You will walk away knowing you need to have and maintain a cryptographic protocol inventory; you need to transition to quantum-resistant cryptography starting with your highest risk data and platforms; and you need to transition in a way that doesn’t interrupt the business.

    2:10 pm
    InfraGard St. Louis Members Alliance Meeting (Open to all attendees)
    • session level icon
    FBI Perspective: AI and U.S. Energy Infrastructure
    speaker photo
    Sr. National Intelligence Officer for Emerging and Disruptive Technologies, FBI
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Session details to come.

    2:10 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Sr. Sales Engineer, Abnormal AI
    speaker photo
    Sr. Director, BISO, Equifax
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Exhibitor Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    speaker photo
    CISO & SVP, First Bank
    speaker photo
    CISO, Equifax Workforce Solutions
    speaker photo
    Deputy CISO, Vetcor
    speaker photo
    Director of Information Security, Shelter Insurance
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    Ever wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.

    Expect candid insights on topics like:

    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners

    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.

    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • C1 | Cisco
    Booth: 130

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Check Point Software Technologies
    Booth: 200

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cloud Security Alliance St. Louis Chapter
    Booth: TBD
  • HPE
    Booth: 240

    Hewlett Packard Enterprise (HPE) is a global technology company that focuses on developing intelligent solutions for capturing, analyzing, and acting upon data. They operate in areas like networking, hybrid cloud, and AI, helping customers create new business models and improve operational performance.

  • InfraGard St. Louis Members Alliance
    Booth: 340

    The InfraGard St. Louis Members Alliance is a trusted alliance between private sector partners, stakeholders, and the FBI united by a shared commitment to protect critical infrastructure. As part of the national InfraGard network, our alliance facilitates collaboration, intelligence sharing and outreach across 16 critical sectors. Members gain access to threat intelligence, security briefings and a dynamic network dedicated to protecting systems that support our lives.

  • ISACA St. Louis
    Booth: 330

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

    Meetings are generally held the 3rd Wednesday of the month between September and May.

  • ISC2 St. Louis Chapter
    Booth: 265

    As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.

  • Missouri Cybersecurity Center of Excellence (MCCoE)
    Booth: TBD

    Missouri Cybersecurity Center of Excellence (MCCoE) is a 501(c)(3) nonprofit organization dedicated to strengthening Southwest Missouri’s regional cybersecurity workforce. We serve university students, early cybersecurity practitioners, and small to medium-sized organizations by providing training and support.

    Through access to advanced tools, professional experts, and real-world security experience, our students help create a safer, more knowledgeable community in data and information protection.

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • OneTrust
    Booth: 120

    OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield.

  • Ping Identity
    Booth: 210

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • Praetorian
    Booth: 150

    Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur. Praetorian applies an offensive filter to help organizations optimize and prioritize their cybersecurity budget on the initiatives that yield the greatest material risk reduction for the fewest dollars spent.

  • Proofpoint
    Booth: 280

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Push Security
    Booth: 260

    Founded in 2020, Push Security is a cybersecurity company offering identity threat detection and response (ITDR) via a browser-based platform. The platform provides real-time visibility and security controls, targeting attacks such as phishing and credential stuffing. Push Security serves customers in technology, finance, and healthcare, with deployment on over 1.5 million endpoints, and has raised $45 million in funding. Based in London, the company’s approach includes automated guidance and behavioral nudges.

  • Saint Louis University Workforce Center
    Booth: 270

    The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber SecurityProject ManagementAgileAnalyticsSoftware Engineering and more.

  • ThreatLocker
    Booth: 100

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS St. Louis Metropolitan Affiliate
    Booth: 320
  • Zscaler
    Booth: 140

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

  • Abnormal AI
    Booth: 220

    Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.

    Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

    Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Rob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program and other cyber risk services offered by CRO.

    Rob graduated with honors from Washington State University with a Bachelors in Management Information Systems and went on to work for a local tech startup in the greater Seattle area. Before joining CRO, Rob interned at a local cyber testing facility based in Bellevue, Washington, and gained his first exposure to the fast-paced world of cybersecurity. His interest in cybersecurity has only increased as the cyber landscape continues to evolve. He looks forward to helping companies manage these constantly changing risks. Outside of work, Rob enjoys exploring the amazing state of Washington with his family.

  • speaker photo
    Chris Spohr, Moderator
    Head of Information Security, Republic Finance
  • speaker photo
    Teri Green
    CIO / CISO, Lite Technology Solutions

    Teri Green is the Chief Information Officer at Lite Technology Solutions and the newly appointed Vice President of Technology at Elevate. With nearly two decades of experience in technology leadership, Teri has led strategic initiatives across cybersecurity, IT operations, and digital transformation. She is known for aligning innovative technology solutions with business goals while advancing equity and resilience across sectors. Teri also serves as President of the Board for WiCyS STL, is an Advisory Board Member for SecureWorld STL, and a mentor with TechLx STL, where she supports emerging leaders on their journey to the C-suite.

  • speaker photo
    Michelle Sickbert
    Sr. Director, BISO, Equifax

    Michelle is the Business Information Security Officer.

  • speaker photo
    Heather Noggle
    Advisory Board Member, Missouri Cybersecurity Center of Excellence

    Heather Noggle is the owner of Codistac, a software and quality assurance solutions company that helps organizations solve problems where people and technology meet—HR, custom software, strategy, and cybersecurity. Human cybersecurity is her passion, reframing cyber hygiene as everyday resistance and empowerment. She also explores the boundaries of generative AI.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Tina Lampe
    Director, IT Software Engineering, DIRECTV

    Tina Lampe (CISSP, CISM, PMP) is the Director of IT Software Engineering at DIRECTV and an Award-Winning Strategic Technology Partner. Tina holds a MS Degree in Cybersecurity from Maryville University. Tina is the Assistant Vice President of the local ISACA board and a local board member of Infragard. Tina has a passion for thought leadership and is an experienced presenter of content in relation to Cybersecurity, Artificial Intelligence, Technology, and Innovation.

  • speaker photo
    Brett Cox
    DFARS/CMMC Cybersecurity Program Management Office Principal, The Boeing Company

    Brett Cox (CISSP, CSSLP, CISM, CISA, CSAE, SecurityX) is a Lead CMMC Certified Assessor and CMMC Provisional Instructor. Brett is the Principal and Team Lead for the DFARS/CMMC Program Management Office within the Quality, Rick Management, and Compliance organization of The Boeing Company specializing in U.S. Government regulatory compliance. Brett has 24 years of Information Technology experience with over 19 years focused on Information Security disciplines. Brett holds a Masters in Cybersecurity from Maryville University, is a member of CompTIA’s Certification SME Technical Advisory Committee, a volunteer for the Cyber AB for CMMC certification exams, and teaches cybersecurity classes at the Saint Louis University Workforce Center such as CMMC, CISSP, and others. Brett serves as an Army Reserve Ambassador to the State of Missouri and is the President of the Midwest region for the Association of the United States Army (AUSA).

  • speaker photo
    Caheen Murphy
    Sr. Solutions Architect, Cybersecurity, C1

    Caheen Murphy is a highly experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Ian Curtis
    Director of SecOps GTM, Zscaler
  • speaker photo
    Daniel Cohen
    Field CISO, Praetorian

    Daniel Cohen serves as Field CISO at Praetorian, where he focuses on strategic advisory services and solutions development to enable his customers to achieve their objectives.

    With over 12 years of experience in cybersecurity, Daniel brings a deep technical background in secure code review, penetration testing, threat modeling, among other things. Prior to joining Praetorian, Daniel served as Senior Director of Professional Services at Synopsys (acquired Cigital in 2016), where he led a high-performing team responsible for service delivery and solution design for strategic customers throughout Eastern North America. Daniel has a B.S in Mathematics from Purdue University.

    Outside of his professional commitments, Daniel enjoys spending quality time with his wife and two young children. He is an overwhelmingly average golfer and follows Washington, DC area sports teams closely.

  • speaker photo
    Brian Lourie, Moderator
    Sr. Manager, Global Cybersecurity, Mars

    Brian supports a wide variety of business units like Mars Wrigley, Kind, VetSource, and Blue Pearl, to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a board member on the St. Louis Scott/AirForce ISC2 regional chapter and was president for three of those years. Brian is also a member of InfraGard and the St. Louis FBI citizens academy.

  • speaker photo
    Panel Discussion
  • speaker photo
    Roftiel Constantine, Moderator
    Global CISO, Barry-Wehmiller

    Roftiel also serves as Vice President of the InfraGard Saint Louis Members Alliance.

  • speaker photo
    Montez Fitzpatrick
    CISO, Navvis Healthcare

    Montez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and community outreach.

  • speaker photo
    Grant Asplund
    Evangelist, Office of the CTO, Check Point Software Technologies

    For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s Evangelist, he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 CIOs and numerous media interviews. Grant’s wide range of cyber security experience informs his talks, having served in diverse roles ranging from sales, marketing, business development, and senior management for Dome 9, Blue Coat Systems, Neustar, and Altor Networks. As CEO of MetaInfo, he led its acquisition by Neustar. Grant is the host of the CISO Secrets podcast (cp.buzzsprout.com) and the Talking Cloud Podcast (www.talkingcloudpodcast.com) on Cloud security.

  • speaker photo
    Panel Discussion
  • speaker photo
    Zachary Lewis, Moderator
    CIO & CISO, University of Health Sciences and Pharmacy in St. Louis

    Zach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving strategic growth. His leadership in negotiating vendor contracts, managing multi-million-dollar budgets, and chairing the Enterprise Risk Management Committee has resulted in substantial cost savings and operational efficiencies.

    With a focus on aligning IT strategies with organizational goals, Zach has led successful cloud migrations, implemented robust cybersecurity measures, and established a culture of transparency and collaboration. His expertise extends to compliance with GLBA and FERPA regulations, managing cybersecurity training programs, and optimizing network infrastructure. Zach's passion for innovation, user-centric approach, and ability to build cross-functional teams have been instrumental in driving organizational success, enhancing cybersecurity defenses, and positioning the institution as a leader in health education and operational excellence.

    Zach is a 2X recipient of Cyber Defense Magazine’s Top Global CISOs, was named 40 Under 40 Security Leaders by CDO Magazine, and was St. Louis Non-Profit CISO of the Year. He’s a recent graduate of the FBI CISO Academy. Zach provides his industry expertise to others by speaking at conferences, webinars, and universities throughout the country.

  • speaker photo
    Jack Sippel
    Cyber Resiliency, T-Mobile

    CISSP and Security+ certified Principal Cybersecurity Engineer using system engineering principles and a lot of curiosity.

  • speaker photo
    Joshua Obstfeld
    Sr. National Intelligence Officer for Emerging and Disruptive Technologies, FBI
  • speaker photo
    Aaron Orchard
    Sr. Sales Engineer, Abnormal AI

    Aaron Orchard is a highly experienced Senior Sales Engineer at Abnormal AI. He brings to his role over four years of industry experience, including two years of work in secure email gateways and another two years of experience in threat intelligence and geological intelligence analysis.

    Aaron's work with the Department of Defense and Intelligence Community gave him a deep understanding of the risks and challenges facing organizations in today's cyber landscape. He is skilled in developing and implementing effective security strategies, as well as in identifying and mitigating potential threats before they can cause harm.

    In his role at Abnormal Security, Aaron draws on his expertise to help clients build robust cybersecurity defenses from modern-day threats such as BEC, VEC, and phishing. He is passionate about empowering organizations to protect their valuable data and assets from a wide range of security threats.

  • speaker photo
    Michelle Sickbert, Moderator
    Sr. Director, BISO, Equifax

    Michelle is the Business Information Security Officer.

  • speaker photo
    Marc Ashworth
    CISO & SVP, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.

  • speaker photo
    Ryan Frillman
    CISO, Equifax Workforce Solutions

    Ryan Frillman is the CISO for Equifax Workforce Solutions, leading security teams across the organization. Previously, he was at Netskope, driving security transformation and cloud strategy, the CISO at Spire Inc., and has experience with the U.S. Department of Defense working for MITRE.

    Ryan teaches graduate cybersecurity management courses at Washington University. He holds a Bachelor of Science degree in Computer Science and a Master of Business Administration with an emphasis on Information Technology. His extensive certifications include CISSP, CEH, ECSA, CCSK, CASP, A+, Network+, and Security+. Ryan is a member of CompTIA’s Executive Advisory Board (EAB) since 2002 and the Mizzou Cybersecurity Industrial Advisory Board (IAB). Additionally, he is a co-founder and partner of STLCIG and LEAD, advising cybersecurity startups.

  • speaker photo
    Ayesha Khalid
    Deputy CISO, Vetcor

    Ayesha Khalid serves as the Deputy Chief Information Security Officer at Vetcor, safeguarding veterinary health operations by leading cybersecurity strategy around Data and Network compliance. She holds over 18 years of experience in enterprise identity and access management (IAM), cloud security architecture, and governance frameworks across Fortune 500 organizations. She is a recognized expert in Zero Trust, FAIR-based risk modeling, regulatory compliance, and global risk transparency. Her work is defined by cross-functional leadership, audit alignment, and secure cloud modernization. Ayesha is known for influencing C-suite and board-level decisions, driving architectural transformation, and enabling secure, scalable business growth.

    She leads with a “security-first” mindset rooted in people-centric principles that prioritize safe environments and individual well-being. Ayesha holds a bachelor's in software engineering, an MBA, and is a certified Risk professional. She has worked for Sanford Health, Mastercard and Citibank. She is also a Member of the Board of advisors on the Center of Cybersecurity for the University of Michigan - Flint.

    Beyond her professional work, Ayesha is a mother, mentor, and leadership member of the NUST United States Technology, Industry & Academic Network (NUSTIAN). She is deeply committed to fostering innovation, collaboration, and inclusive community for secured communities and organizations.

  • speaker photo
    Travis Nichols
    Director of Information Security, Shelter Insurance

    Travis Nichols is a seasoned leader in Information Security at Shelter Insurance, where he spearheads the safeguarding the organization’s digital assets. With a robust background in software development, cybersecurity, and management, Travis has consistently demonstrated his commitment to excellence and innovation. His journey is marked by a relentless pursuit of knowledge and dedication to fostering a culture of continuous improvement and learning, both within his team and the broader community. Travis’s leadership philosophy centers on growth, value creation, and enhancing the lives of those around him, including his wife and two grown children. Through his strategic vision and passion for leadership, Travis continues to drive impactful change and inspire those he leads. One of his favorite questions to ask is: “How can I help you be your best?”

  • speaker photo
    Happy Hour
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.