Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 22, 2025
    9:00 am
    [PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and Applications
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Concourse South

    AI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.

    Lesson 1: What is Artificial Intelligence?
    Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.

    Lesson 2: What are the AI threats?
    Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.

    Lesson 3: What are the AI vulnerabilities?
    Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.

    Lesson 4: What are AI security controls?
    Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.

    Lesson 5: What is AI risk management?
    Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.

    Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
    One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data Cards

    Lesson 7: What are the AI governance, AI compliance, AI audit requirements?
    Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    Lesson 8: Building an AI security program
    Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.

    Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

  • Thursday, October 23, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    How to Define and Build Your Brand
    speaker photo
    CISO & Founder, Rose CISO Group; Former CISO of Amplitude, Mailchimp
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Mercer
    Security leaders can struggle with developing and promoting themselves. After all, we are intended to be the “silent” guardians of the enterprise and the majority of us are Introverts. However, there are benefits of being recognized for key endeavors, amongst them supporting your paths forward after being a CISO.
    In this interactive session over breakfast, Olivia will discuss key methods to how to effectively increase your name recognition in the industry. Olivia currently has over 34K followers on LinkedIn and is often asked to speak on podcasts, at events, and in published articles.
    8:00 am
    Atlanta ISC2 Chapter Meeting (Open to all attendees)
    • session level icon
    ML Modeling Basics and the OWASP Top 10 for ML/AI
    speaker photo
    President, ISC2 Atlanta, and ISC2 Trainer / Cloud Security Architect / CISO
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Concourse South

    Session details to come.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    speaker photo
    VP, Information Security & CISO, Piedmont Healthcare
    speaker photo
    CISO, Information Security & Compliance Officer, Paradies Lagardère
    speaker photo
    CISO & VP of Infrastructure Services, Carter’s, Inc.
    speaker photo
    Former CISO, NCR Corporation
    speaker photo
    CISO / CIO, Esquire Deposition Solutions, LLC
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Ever wondered what keeps CISOs up at night? In this interactive fireside chat,  local security leaders share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead. Expect candid insights on topics like:

    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners

    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:15 am
    Balancing Security and Operations in Building Control Systems
    • session level icon
    speaker photo
    SVP, Secure Digital Solutions, KMC Controls
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    Location / Room: Mercer

    Building control systems are increasingly targeted in today’s threat landscape—but the bigger danger may lie in how IT and OT teams respond. In this engaging session, Fred shares lessons from a career that began in IT and shifted to building control system security after a wake-up call while supporting WarnerMedia global operations. Through real-world case studies—like a vulnerability scan that knocked 6,000 devices offline—Fred illustrates the hidden risks of misaligned IT/OT priorities.

    Attendees will explore how to implement right-sized security measures that safeguard building systems without disrupting critical operations. Key themes include risk assessment, the limitations of traditional IT tools in OT environments, and the enduring power of curiosity as a primary attack vector.

    10:15 am
    Supply Chain Attacks - Zero Day: Software Composition Analysis or Open-Source Security Threats
    • session level icon
    speaker photo
    Cybersecurity Lead Member of Technical Service, Salesforce
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    Location / Room: Concourse North
    Supply chain attacks occur when adversaries compromise trusted software vendors, service providers, or open-source repositories to infiltrate downstream organizations. High-profile incidents such as SolarWinds and Log4j highlight how attackers exploit trusted relationships to deliver malicious code or exploit vulnerabilities at scale. These attacks are especially dangerous because they bypass traditional defenses by leveraging legitimate channels.
    With more than 80–90% of modern applications built on open-source components, organizations face heightened risk from inherited vulnerabilities. SCA tools help identify open-source libraries, track known vulnerabilities (via databases like CVE/NVD), and ensure license compliance. By integrating SCA into CI/CD pipelines, enterprises can continuously scan for risks, prioritize remediation, and establish resilience against both known and emerging threats.

    Supply chain attacks, zero-days, and open-source vulnerabilities represent a national and global security challenge. They threaten critical infrastructure, financial systems, transportation, healthcare, and government operations. Protecting against them requires proactive security strategies, including:

    By addressing these challenges holistically, organizations can strengthen trust in digital ecosystems and reduce systemic risks in global supply chains.
    10:15 am
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    VP, Corporate Cybersecurity, Third Party Risk Management, Truist
    speaker photo
    VP, Cyber Risk Advisory, Aon
    speaker photo
    Senior Director, Vulnerability Management, Application Security and Control Monitoring, Cox Communications
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am
    Location / Room: Concourse South

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    The Human Side of Cyber in the Age of AI
    • session level icon
    speaker photo
    Former Region 4 Director, CISA; Adjunct Faculty, University of Maryland Global Campus
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am
    Location / Room: Mercer

    As AI transforms cybersecurity—accelerating both threats and defenses—it’s easy to lose sight of the human decisions, ethics, and leadership that still shape the field. This session explores how AI is changing the cyber landscape and what it means for the people behind the systems. Attendees will gain a practical framework for navigating risk, building resilient defenses, and leading with clarity in an increasingly automated world.

    11:10 am
    The Psychology of Phishing: Designing Human‑Centered Awareness Programs
    • session level icon
    speaker photo
    GRC Officer, Georgia Tech Research Institute
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am
    Location / Room: Concourse North

    Phishing is still the most common attack method because it taps into natural human biases. In this session, we’ll break down the key psychological triggers—like authority, urgency, and social proof—that make these attacks work.

    You’ll learn how to build awareness programs that actually connect with employees by focusing on what motivates real behavior. We’ll walk through a practical framework for designing empathy-based simulations, tracking behavior change over time, and improving your training based on what works.

    You’ll walk away with a proven, psychology-based blueprint and ready-to-use templates to build phishing awareness programs that cut click rates by over 30% in just three months.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    CISO, Employees' Retirement System of Georgia
    speaker photo
    Sr. Manager, Systems Engineering - Americas, HPE
    speaker photo
    Deputy CISO, The Chemours Company
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am
    Location / Room: Concourse South

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Cyber Stars™: Celebrating Excellence in Atlanta's Cybersecurity Community
    • session level icon
    speaker photo
    Founder & Managing Director, Class-LLC™
    speaker photo
    Sr. Human Resources Leader
    speaker photo
    Managing Director, Healthcare Cybersecurity, RSM US LLP
    speaker photo
    Independent Cybersecurity Consultant & Strategic Advisor
    speaker photo
    Sr. Application Security Architect, Tempus AI
    speaker photo
    Head of Customer Excellence - Identity, GuidePoint Security
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The ISSA Metro Atlanta Chapter has partnered with SecureWorld to honor the city’s brightest cybersecurity professionals at the Cyber Stars™ Awards ceremony. This event celebrates excellence across five key categories, recognizing individuals at various stages of their careers:

    • Blazing Stars (Security Leaders)
    • Brilliant Stars (Senior-Level Professionals)
    • Shining Stars (Mid-Career Professionals)
    • Rising Stars (Entry-Level Professionals)
    • Emerging Stars (Pre-Professional/Students)
    These awards shine a spotlight on the extraordinary contributions of cybersecurity leaders within the Metro Atlanta area. Nominees and winners, selected by an independent panel of judges, represent the best of our field. Don’t miss the opportunity to celebrate these remarkable individuals who are helping to shape the future of cybersecurity!
    Here are the nominees:
    • Michael Brown, Information Security Director, Macy’s
    • Ken Foster, CISO, Candescent
    • Eric Logan, Director, Information & Network Security, DeKalb County School District
    • William Morrison, Director, Cybersecurity Operations/Incident Response, Guidehouse
    • Ashley Petit, VP & CIO, Northside Hospital
    • Sameer Ali, CISO, Parker Hudson
    • Kera Logan, Director, PCI Compliance and Enterprise Risk Communications, North (formerly North American Bancard)
    • Sanat Pattanaik, Principal Security Architect, ADP
    • Hilary Brennan, Senior Systems Engineer, Home Depot
    • Jesse Neesmith, Incident Response Analyst, FiServ
    • Aidan McDow, Student/Intern, Georgia Tech Research Institute
    • David Ripley, Student at Kennesaw State University, President of ISSA Student Club
    • Evan Sterling, Student at Kennesaw State University
    • Susan Woodard, Student at Kennesaw State University
    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    Enhancing Security, Easing Compliance: PCI DSS for Multi-Payment Channel Organizations
    • session level icon
    speaker photo
    Director, Schellman Compliance LLC
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm
    Location / Room: Concourse North

    Navigating PCI DSS compliance can be daunting for multi-payment channel merchants and service providers handling diverse transaction environments. This presentation explores practical strategies to reduce compliance burden while bolstering security. Attendees will learn how simple process changes, such as tokenization and point-to-point encryption, can minimize sensitive data exposure. We’ll also examine the benefits of outsourcing specific PCI DSS responsibilities to trusted third-party providers, enabling organizations to focus on core operations without compromising security.

    Drawing on real-world examples, the session will highlight how these approaches streamline compliance efforts, reduce costs, and enhance protection across online, in-store, and mobile payment channels. Ideal for merchants and service providers, this talk offers actionable insights to achieve PCI DSS compliance efficiently.

    Learn how multi-payment channel merchants and service providers can simplify PCI DSS compliance and enhance security through strategic process changes and outsourcing.

    1:15 pm
    Advisory Council Roundtable (VIP / Invite only)
    • session level icon
    The Strategic Value of Continuous Controls Monitoring in Compliance and Risk Management
    speaker photo
    Advisor, Strategic Security, Risk & Compliance Management, DataBee, a Comcast Company
    Registration Level:
    • session level iconVIP / Exclusive
    1:15 pm - 1:50 pm
    Location / Room: Mercer

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Audits are inevitable—but they don’t have to be painful. Continuous controls monitoring (CCM) turns compliance into a strategic advantage by automating control visibility and aligning metrics with business-critical KPIs. Comcast’s own use of a security data fabric platform has shown how real-time insights can simplify audits, improve risk management, and elevate cybersecurity’s role in business decisions. Whether you’re in eCommerce or construction, CCM helps tie control monitoring to operational impact—empowering CISOs to prioritize resources, justify investments, and lead with data.

    Generously sponsored by:

    1:15 pm
    [Panel] Proactive Security: Building Digital Fortresses Against Modern Dragons
    • session level icon
    speaker photo
    VP, Channel & Sales Enablement, 11:11 Systems
    speaker photo
    VP, Sales Engineering, Cyberhaven
    speaker photo
    Global Field CISO, Cohesity
    speaker photo
    Co-Founder, Ethics Security
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm
    Location / Room: Concourse South

    In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.

    This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.

    Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    Keeping the Music Playing: Finding Calm in the Chaos of Cybersecurity
    • session level icon
    speaker photo
    Cybersecurity Director, GFT
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    Location / Room: Mercer

    This workshop explores how cybersecurity professionals can protect their mental health and emotional resilience in an environment that never stops moving. Using the “Let Them” theory (letting go of control over others’ actions and focusing on your own peace) as the foundation, participants will learn to “keep the music playing” to maintain inner rhythm and purpose even as incidents, audits, and alerts demand constant reaction.

    2:10 pm
    Zero Trust for Generative AI: Securing the Next Frontier of Enterprise Intelligence
    • session level icon
    speaker photo
    Principal Security Architect, ADP
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    Location / Room: Concourse North

    Explore how Zero Trust security principles are evolving to protect against emerging threats in the era of Generative AI. This session will delve into real-world risks, including prompt injection, data leakage, and shadow AI, while showcasing how organizations can apply Zero Trust principles to secure AI models, data, and users. Learn practical strategies, industry case studies, and best practices to build AI-resilient infrastructure. Ideal for cybersecurity leaders, IT professionals, and AI practitioners aiming to future-proof their security posture.

    2:10 pm
    And They Lived Happily Ever After: A Cybersecurity Fairytale
    • session level icon
    speaker photo
    Sr. Director, Privacy & Compliance, GoTo Foods
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm
    Location / Room: Concourse South

    If you have ever gone down a rabbit hole, you’ll know that there is always another path you can take. In a world where non-human identities exist, fakes are deep, and it’s hard to determine data from information, one has to stay on their toes.

    This presentation will go with Alice through the looking glass, follow hatters that are mostly mad, and take you on a journey where Jack is actually the bad guy of the story. Along the path, we’ll look at how Privacy may be on life support, but not quite dead yet, and how the Knights and Knaves of the world factor into Cybersecurity.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Beyond Prevention: Building Cyber Resilience Through Recovery
    • session level icon
    speaker photo
    VP, Channel & Sales Enablement, 11:11 Systems
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater
    Organizations invest heavily in prevention, but in today’s threat landscape it’s not a matter of if an attack will succeed, but when. The true differentiator between victims and survivors is the ability to recover quickly, cleanly, and confidently.
    In our presentation, we will discuss:
    • Why recovery is as critical as prevention, including the business and reputational costs of downtime.
    • Ways to improve your cyber resilience with these key components—immutability, disaster recovery as a service (DRaaS), clean room environments, and validation.
    • How to build a cyber recovery strategy that integrates people, process, technology, and clear communication.
    Ultimately, resilience is about more than surviving an attack—it’s about sustaining trust, continuity, and confidence in an unpredictable world.
    3:45 pm
    Dash for Prizes and Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Networking Hall

    Stick around after the closing keynote as we announce the winners of SecureWorld’s Dash for Prizes giveaways—did your name make the list? Then raise a glass with us during Happy Hour as we celebrate a successful day of learning, networking, and collaboration.

Exhibitors
  • 11:11 Systems
    Booth: 200

    11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.

  • Cohesity, Inc
    Booth: 310

    We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.

  • Cyberhaven
    Booth: 140

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cyversity Atlanta Chapter
    Booth: 280

    Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.

  • DataBee, a Comcast Company
    Booth: 160

    Comcast DataBee is a powerful data integration platform that enables users to extract data from various sources, transform it into the desired format, load it into a target system, and visualize the data using business intelligence (BI) tools. With the help of DataBee, you can efficiently manage and manipulate large amounts of data to gain insights and make informed decisions.

  • HPE
    Booth: 130

    Hewlett Packard Enterprise (HPE) is a global technology company that focuses on developing intelligent solutions for capturing, analyzing, and acting upon data. They operate in areas like networking, hybrid cloud, and AI, helping customers create new business models and improve operational performance.

  • InfraGard Atlanta Members Alliance
    Booth: 320

    InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. Businesses, individuals involved in the protection and resilience of the U.S. critical Infrastructure and the Federal Bureau of Investigation.

    InfraGard National Members Alliance (INMA), which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together.

    IAMA is the Atlanta chapter of InfraGard. It is a local association of persons who represent businesses, academic institutions, state and local law enforcement agencies, non-profit organizations and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.

  • ISACA Atlanta
    Booth: 320

    The aim of the ISACA Atlanta Chapter is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help further promote and elevate the visibility of the IT audit, risk, control and security professions throughout the local area.

    Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology.

  • ISC2 Atlanta
    Booth: 340

    ISC2 Atlanta chapter encompasses the Atlanta Metro area. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.

    Our mission is to advance information security in local communities throughout Atlanta, Georgia, by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. ​

  • ISSA Metro Atlanta Chapter
    Booth: 290

    The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • OneTrust
    Booth: 230

    OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield.

  • Red Canary, a Zscaler company
    Booth: 300

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • Sumo Logic
    Booth: 120

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • ThreatLocker
    Booth: 240

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Wallarm
    Booth: 170

    Wallarm is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their APIs and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. Customers can deploy Wallarm to protect legacy and brand new cloud-native APIs. Wallarm’s multi-cloud platform delivers capabilities to secure businesses against existing and emerging API threats.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Olivia Rose, Moderator
    CISO & Founder, Rose CISO Group; Former CISO of Amplitude, Mailchimp

    Olivia Rose is an award-winning cybersecurity leader and three-time global Chief Information Security Officer (CISO). Olivia is the founder of the Rose CISO Group, a boutique security company delivering exceptional vCISO, Board Communications, and Strategic services to Fortune 1000 companies.

    Before founding Rose CISO Group, Olivia was a 23-year security industry veteran, including CISO roles with Mailchimp and Amplitude, and 17 years as a virtual CISO and strategic advisor for Fortune 1000 companies.

    Olivia holds numerous IT, Privacy, and Security certifications, and is an active participating member of several industry groups. She is frequently requested at speaker events and podcasts and is regarded as a thought leader in the industry.

  • speaker photo
    Mikal Hass
    President, ISC2 Atlanta, and ISC2 Trainer / Cloud Security Architect / CISO

    Mikal is a 30-year information security, risk management, and IT professional with a strong background in development, architecture, and management. He has considerable expertise in designing, building, and managing information security and risk management programs in highly-regulated private and public sector organizations.

  • speaker photo
    Monique Hart
    VP, Information Security & CISO, Piedmont Healthcare

    Monique Hart is an award-winning, results driven leader with over 25 years’ experience in Network Infrastructure, Cybersecurity, and Governance, Risk, & Compliance. Her work has crossed multiple industries including Telecommunications, Food & Beverages, Media & Entertainment, Transportation, and Healthcare. Currently, she is the Vice President of Information Security and CISO for Piedmont: a 26-hospital system and the leading healthcare provider in Georgia. In this role, she is responsible for overseeing the security of electronic Health Care information as it pertains to Piedmont’s business, employees, and patient data.

    You may read her views on building strong teams and programs in her recently published co-authored book, "Wired for Success."

  • speaker photo
    Michael Marsilio
    CISO, Information Security & Compliance Officer, Paradies Lagardère

    Michael Marsilio is the Information Security and Compliance Officer for Paradies Lagardère, where he is responsible for information security, risk management, privacy, and compliance. Michael plays a strategic role in protecting Paradies Lagardère computing environment and data, he also helps drive global security initiatives. He has more than 30 years of experience in building and managing security and compliance programs for both public and private companies and has a substantial track record in PCI, PII, PHI, IT General Controls and developing cybersecurity policy for financial, retail, and legal organizations.

    He is based at Paradies Lagardère Corporate Headquarters, in Atlanta, GA.

  • speaker photo
    Kemper Seay
    CISO & VP of Infrastructure Services, Carter’s, Inc.

    Kemper Seay is a strategic technology executive with over 25 years of experience driving cybersecurity, ecommerce, and IT transformation across enterprise environments. As Chief Information Security Officer and Vice President of Infrastructure at Carter’s, Inc., she leads global cybersecurity strategy, cloud modernization, and IT operations, managing a team of 100+ professionals. Kemper previously built Carter’s ecommerce business from the ground up, growing it to over $400 million in annual sales. She is a recipient of the 2024 Women in Technology “Woman of the Year” award and a Georgia CISO ORBIE finalist. An advocate for STEM and youth leadership, she serves on multiple advisory boards and is a mentor for FIRST Robotics. Kemper is a candidate for the NACD Directorship Certification and holds a B.S. in Psychology.

  • speaker photo
    Bob Varnadoe
    Former CISO, NCR Corporation

    Bob Varnadoe is a seasoned executive with over twenty-five years building IT and security programs. He has served in information security leadership in fortune 500 companies including as Chief Information Security Officer for NCR Corporation and Vice President of Information Security at Fiserv as well as Vice President of Risk Management at Kaiser Permanente. He currently serves as an executive advisor to Plume Security.

    Through his roles, Bob has a depth of experience in overall information security, data privacy program management, IT risk management, compliance management (FFIEC, PCI, and HIPAA), audit management (SOC1/2/3, ISO27001), application security, identity and access management, detection and response, security architecture and engineering, physical security, executive protection, and crisis management.
    Bob holds a Bachelor’s Degree in Electrical Engineering from the Georgia Institute of Technology.

    He is also passionate about developing future cyber security leaders and addressing the technology needs of non-profits through his activity with Year Up United and TechBridge.

  • speaker photo
    Jim Ballowe, Moderator
    CISO / CIO, Esquire Deposition Solutions, LLC
  • speaker photo
    Fred Gordy
    SVP, Secure Digital Solutions, KMC Controls

    Fred spearheads cybersecurity strategies for operational technology (OT) systems—like HVAC, BAS, and lighting—across a wide range of facilities. With more than two decades of experience in control systems security, Fred is a recognized thought leader in smart building cybersecurity. His leadership in advancing secure building operations and industry best practices earned him the prestigious Julie Devine Digital Impact Award in 2025. Fred’s work continues to shape cybersecurity standards and protect critical building infrastructure.

  • speaker photo
    Karthikeyan Ramdass
    Cybersecurity Lead Member of Technical Service, Salesforce

    Karthikeyan Ramdass is a distinguished cybersecurity leader with extensive experience in building and advancing enterprise security programs for some of the world’s largest and most critical organizations, including Salesforce, Toyota Motors North America, Morgan Stanley, Wells Fargo, Southwest Airlines, AIG, and Deluxe Corporation. With deep expertise in Application Security, Secure SDLC, Vulnerability Management, Penetration Testing, Threat Modeling, Cloud Security, and Red Team operations, Karthikeyan Ramdass has played a pivotal role in safeguarding business-critical systems, products, and services against emerging cyber threats. He has designed and implemented enterprise-scale security pipelines, integrated advanced static and dynamic testing platforms, and led initiatives to eliminate high-risk vulnerabilities prior to production deployment.

  • speaker photo
    Keith Deininger
    VP, Corporate Cybersecurity, Third Party Risk Management, Truist

    Keith Deininger’s extensive career spans more than 35 years. His journey began after obtaining a degree in Computer Science and Information Systems, developing Mainframe Financial Applications. But always wanting a new challenge, Keith decided to return to university to pursue a degree in Electrical Engineering Technologies. After obtaining this degree, Keith worked as controller designer for several of Japan’s largest electronics manufacturers. But then along comes the emerging world of Cybersecurity. So, what did Keith decide to do? Obtained a degree in Cybersecurity Assurance and Risk Management and now currently helps lead the Third-Party Risk Management program at Truist.

    Over the last 9 years Keith has been an avid presenter at nationally recognized cybersecurity conferences covering an array of topics. Topics include Agentic AI Risks & Rewards, Developing an Effective Third-Party Management Program, Data Governance & Cybersecurity, Social Engineering, Zero-Trust Networking, and Threats to National Infrastructure Systems related to Cybersecurity.
    Keith holds active certifications from ISACA and ISC2 and has also been recognized by ISC2 as a Global Subject Matter Expert and Certified Exam Writers for their CISSP, SSCP, CCSP, and CGRC certifications for over a decade. Keith currently serves on several cybersecurity advisory boards and leadership councils helping to shape cybersecurity initiatives.

    If there is one personal ideology that Keith loves to share with everyone is that we are all teachers, and at the same time we are all students of each another; never stop learning and never stop spreading knowledge to others.

  • speaker photo
    Sundar Nagarajan
    VP, Cyber Risk Advisory, Aon

    Sundar Nagarajan is an accomplished Information Security executive with a proven track record in the technology and financial sectors. As a Business Information Security Officer and Vice President of Cyber Risk Advisory at Aon Inc., Sundar partners with C-suite leaders and board members, translating complex security challenges into actionable strategies that protect enterprise value. With over 25 years of experience guiding Fortune 500 corporations through evolving cybersecurity landscapes, Sundar is known for driving robust security programs, cultivating high-performing teams, and leading initiatives that align security with business objectives.

    Sundar’s expertise spans vulnerability management, risk assessment, data protection across multi-cloud environments, regulatory compliance (NIST CSF, ISO 27001/27002, PCI-DSS, GDPR, HIPAA, and more), information security contract management, and customer audits. He has successfully overseen the security of thousands of applications in hybrid cloud setups, advised on third-party/vendor risk, and built KPIs/KRIs frameworks to monitor cyber risk maturity. Having managed both programmatic enhancements and tactical incident response, Sundar excels at bridging technical and non-technical audiences, mentoring global teams, and steering key security projects to completion within scope and budget.

    A natural leader and trusted adviser, Sundar is highly regarded for his ability to inspire teams, foster strong client and vendor relationships, and deliver security

  • speaker photo
    Jacob Prosser, Moderator
    Senior Director, Vulnerability Management, Application Security and Control Monitoring, Cox Communications

    Jacob Prosser is a seasoned cybersecurity professional with more than 14 years of experience in the field. As a Director of Cyber Defense at Cox Communications, he and his team play a critical role in keeping the company and its customers safe from cyber threats. His expertise spans various domains within cybersecurity including application security, identity and access management, security architecture, detection engineering, and incident response.

    Jacob graduated from the University of Georgia with a degree in Management Information Systems, and he holds a CISSP certification.

  • speaker photo
    Julius "Jay" Gamble
    Former Region 4 Director, CISA; Adjunct Faculty, University of Maryland Global Campus

    Jay Gamble is a Senior Consultant with Vibrint Corporation and a recognized cybersecurity leader with more than two decades of experience securing the nation’s critical infrastructure.

    Before joining Vibrint, Gamble served as Regional Director for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), where he led federal efforts to strengthen cyber and physical resilience across eight southeastern states. His work brought together government and private-sector partners to reduce risk, improve incident response, and safeguard vital systems that power the nation’s economy and defense. Gamble’s career also includes senior technology leadership roles with the U.S. Army Forces Command (FORSCOM), U.S. Customs and Border Protection, and the City of Baltimore, where he advanced initiatives in cybersecurity operations, IT modernization, and organizational resilience.

    A passionate advocate for developing future cyber leaders, Gamble has served as Adjunct Faculty at the University of Maryland Global Campus since 2016, teaching in the Master of Science in Cybersecurity Technology program. He holds a Master of Science in Information Systems from American University, a Master of Divinity from Howard University School of Divinity, and a Bachelor of Science in Business Administration from Bowie State University.

  • speaker photo
    Emmanuel Nwajiaku
    GRC Officer, Georgia Tech Research Institute

    Emmanuel Nwajiaku is a GRC Officer at Georgia Tech Research Institute and an Instructor. He holds CISSP, Security+, and Network+ certifications, along with a Secret clearance. Emmanuel focuses on AI-enhanced security policies and human-centered defense strategies. He has led awareness programs that reduced phishing click rates by 30% and teaches these approaches in both corporate and academic settings.

  • speaker photo
    Michael Brainard
    CISO, Employees' Retirement System of Georgia
  • speaker photo
    Dmitri Lee
    Sr. Manager, Systems Engineering - Americas, HPE
  • speaker photo
    Antonio Andrews, Moderator
    Deputy CISO, The Chemours Company

    Antonio Andrews is a senior cybersecurity executive with more than 20 years of experience leading global cybersecurity programs across various industries. He has built and transformed cybersecurity governance, risk, and compliance programs for complex, multi-region enterprises. He is recognized for driving digital transformation, regulatory compliance, and business-aligned cyber risk strategies that deliver measurable improvements in resilience, audit readiness, and data protection. He is a trusted advisor to executive leadership and is passionate about enabling business growth through innovative, secure-by-design approaches. Antonio maintains leading industry certifications such as CCISO, CISSP, CISM, CDPSE, and CISA.

  • speaker photo
    Keyaan Williams, Emcee
    Founder & Managing Director, Class-LLC™

    An MBA and JMT Certified Team Member, Keyaan followed a unique path to becoming a risk leader. The story begins with service in the U.S. Army as chemical weapons specialist. Later, he worked in communications security for the Army Reserve Command Headquarters. Then, he spent more than a decade in various IT and security roles at the Centers for Disease Control and Prevention (CDC) in Atlanta.

    CLASS-LLC was founded with a vision to help global customers benefit from strategy, governance, and program management lessons learned throughout his career. Beyond security, Keyaan is known for his service as the Past President of ISSA International, Chair of the risk committee for a global ministry, and Founding Member of the Private Directors Association Atlanta Chapter.

  • speaker photo
    Shelley Greenhalgh, Judge
    Sr. Human Resources Leader

    Now happily retired and enjoying the next chapter, Shelley Greenhalgh spent her career as a dynamic human resources leader, working for global and Fortune 150 companies to build stronger, more people-focused organizations. She’s best known for her ability to connect the dots between business strategy and talent—especially in fast-paced technology environments.

    Over the years, Shelley worked side-by-side with CTOs and senior execs to shape cultures where people could truly thrive. She played a key role in designing tech-focused compensation strategies and career pathing programs—tools that helped companies not just attract top talent, but keep them growing and engaged for the long haul.

    Along the way, she picked up a few credentials (because learning is kind of her thing). Shelley holds certification from SHRM, NTL certification in Organizational Development, certified mediator in the state of Georgia, and an Affirmative Action certification from Cornell University. These days, she’s traded boardrooms and conference rooms for good times with friends, but her passion for people, culture, and growth still shows up in everything she does.

  • speaker photo
    Lenny Levy, Judge
    Managing Director, Healthcare Cybersecurity, RSM US LLP

    Mr. Levy brings years of experience helping organizations address cybersecurity challenges. Prior to making the transition to Chief Information Security Officer (CISO) for healthcare organizations, he consulted on cybersecurity topics for organizations around the world based in the United States and Singapore. Now Mr. Levy leads RSM’s North America healthcare cybersecurity practice working with clients to reduce risk associated with emerging threats, regulatory compliance, data loss, and AI governance.

    He holds a Bachelor of Science in Decision and Information Sciences from the University of Florida and a Master of Business Administration (MBA) from Duke University Fuqua School of Business. He holds Certified Information Systems Security Professional (CISSP) and Certified Information Systems Auditor (CISA) certifications.

  • speaker photo
    Hiten Patel, Judge
    Independent Cybersecurity Consultant & Strategic Advisor

    Hiten is an independent cybersecurity consultant and strategic advisor with more than 20 years of experience advising Fortune 500 organizations and their executive leadership teams to build business-aligned security programs that drive organizational resilience. Specializing in executive advisory services for CISOs and C-suite leaders, he combines deep technical expertise with strategic business acumen to translate cybersecurity investments into measurable business outcomes. Hiten excels at bridging the gap between complex security requirements and business objectives across regulated industries.

    His current consultancy focuses on cybersecurity strategy development and CISO advisory services, drawing from his extensive background leading enterprise risk management and compliance programs spanning various cyber and privacy frameworks at Accenture, EY, and PwC, where he served clients across global markets. Having directed transformational security initiatives, he brings proven expertise in scaling security programs and developing governance frameworks that enable digital transformation while maintaining robust security controls across financial services, retail, healthcare, and manufacturing sectors.

  • speaker photo
    Damien Suggs, Judge
    Sr. Application Security Architect, Tempus AI

    Damien is a recognized leader in the Atlanta area. He is an OWASP Advocate and Threat Modelling Specialist with over twenty-three years of experience. He has worked in various industry verticals and a wide range of IT Security disciplines.
    Damien has been directly involved with penetration testing and ethical hacking of networks, applications, mobile applications, IoT devices, and cloud computing environments. He specializes in implementing all aspects of an application security program, including creating policies, processes, and procedures that govern the implementation of security practices into the fabric of the organization and company culture.

  • speaker photo
    Mark Whitesell, Judge
    Head of Customer Excellence - Identity, GuidePoint Security

    Mark Whitesell has been in the IT Security space for over 30 years. Mark has held leadership positions at RSA Security, Okta and Saviynt; and is widely considered an expert in identity management and governance space. Mark sits on the Advisory Board for ISSA Metro Atlanta, in addition to several other identity companies. Mark is a graduate of Georgia Tech and lives in the Atlanta area with his wife and four children.

  • speaker photo
    Matt Crane
    Director, Schellman Compliance LLC

    Matt Crane, Director at Schellman, oversees PCI DSS assessments for diverse industries, leveraging over a decade of information security expertise. He conducts PCI workshops, speaks at industry events, and collaborates with Fortune 500 companies on compliance challenges, including SWIFT CSCF. Before joining Schellman in 2017, Matt specialized in PCI and NIST assessments and intelligence analysis in both private and public sectors. He holds a BBA in Information Security and Assurance and certifications including CISSP, CISA, CRISC, and QSA, ensuring clients receive expert guidance in achieving compliance goals.

  • speaker photo
    Joseph Jones, Moderator
    Advisor, Strategic Security, Risk & Compliance Management, DataBee, a Comcast Company

    Joseph Jones is a cybersecurity leader at DataBee®, a Comcast Company, where he helps enterprise organizations transform their security and IT data points into integrated, accessible, and continuous intelligence. With deep expertise in cybersecurity, compliance, risk management, and control automation, Joseph has played a key role in bringing to market DataBee’s security data fabric platform—enabling real-time visibility, continuous controls monitoring, and streamlined audit readiness. He is passionate about aligning cybersecurity with business outcomes and empowering teams to make data-driven decisions. Joseph frequently speaks on topics such as continuous compliance, risk-informed security, and the evolving role of CISOs in today’s enterprise landscape.

    Joseph has spent most of his career in cybersecurity, with management roles at StrikeReady, Splunk, IOActive and Damballa prior to joining DataBee in 2023.

    Joseph holds a B.S. and a BBA from the University of Georgia and its Terry School of Management, and is based in Atlanta, GA.

  • speaker photo
    Jack Bailey
    VP, Channel & Sales Enablement, 11:11 Systems

    Jack Bailey is the Vice President of Sales & Channel Enablement at 11:11 Systems. He is a driven IT sales and learning professional with demonstrated success in management, solving customer challenges and sales enablement. He oversees the alignment of advanced networking protocols, virtualization architecture, and multi-vendor/protocol support of production, testing, and disaster recovery solutions to customer challenges.

  • speaker photo
    John Loya
    VP, Sales Engineering, Cyberhaven

    John Loya is the Vice President of Sales Engineering at Cyberhaven. He has previously held roles at Microsoft, McAfee, and Digital Guardian. In his current role he assists customers and prospects globally with their data protection needs in terms of compliance, governance, privacy, classification, and security. He has worked previously as a developer, quality assurance engineer, and an automation engineer. He has been in the security space for the past 19 years with a strong focus on Data Loss Prevention and Insider Risk Management.

  • speaker photo
    Dr. Joye Purser, CISSP
    Global Field CISO, Cohesity

    Dr. Joye Purser is Global Field CISO at Cohesity, the number-one maker of data backup systems. She also is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.

    In 2022, she was the first-ever senior executive Regional Director for Cybersecurity in CISA Region 4, for the U.S. Department of Homeland Security. At CISA, the Cybersecurity and Infrastructure Security Agency, Dr. Purser delivered strategic vision for a geographically distributed team of security experts and strengthened partnerships with critical infrastructure owners in the region. Prior to that, Dr. Purser worked in the private sector at a large, global management consulting firm, where she facilitated enterprise risk management and business continuity activities for a 10,000-staff client. She led global pandemic recovery operations, enabling a county of 4.7 million people to organize, plan, and expend more than $400 million in COVID relief aid.

    Working for 20 years in Washington, Dr. Purser was selected to serve in the White House at the Office of Management and Budget (OMB), where she oversaw development of the $95 billion Department of Defense technology budget. While at OMB, she led an effort that galvanized federal agencies, the private sector, and Congress to unify to secure and strengthen the semiconductor supply chain.

    Dr. Purser led audit activities at the Pentagon for a decade, advising on the design and deployment of multi-billion-dollar IT programs such as financial management systems and electronic health records. A governance, risk, and compliance expert, she authored internal policies establishing new authorities for the Director of Cost Assessment and Program Evaluation (OSD/CAPE) for an agency with a two-million-person workforce.

    Before that, Dr. Purser worked on Capitol Hill as a seasoned legislative staffer, guiding the agenda for two members of Congress on the House Science Committee. There, she steered the House Diversity and Innovation Caucus; drafted a bill promoting a more diverse technology workforce that passed into law; organized constituent town hall events; worked on a presidential campaign; and contributed to the drafting of the Affordable Care Act.

    Earlier in her career, Dr. Purser has consulted on federal engagement strategy as Vice President of Artemis Strategies; and she worked at the nonprofit, Research America, to educate scientists on how to engage with Congress more effectively and in their communities. She serves on the Board of Cyversity; mentors a large group of security professionals; and devotes her gifts of communication, strategy, and coalition-building in a number of volunteer activities in her community.

    A graduate of Georgia Tech, Dr. Purser has a technical background as an accomplished researcher. Her first scientific publication has been cited more than three hundred times. She resides in Atlanta with her spouse and children.

  • speaker photo
    Chamon Gayton, Moderator
    Co-Founder, Ethics Security

    Chamon Gayton is a highly motivated and accomplished cybersecurity professional and retired military veteran, bringing over 17 years of proven experience in security operations, governance, risk and compliance (GRC), and information assurance within both federal and private sector environments. Specializing in leading enterprise-wide security initiatives, Chamon has a distinguished record of successfully guiding organizations through complex compliance and security challenges, with deep expertise in federal frameworks including FISMA, FedRAMP, StateRAMP, NIST (800-53, 800-53A, 800-18, 800-60), FIPS 199 & 200, and DoD standards.

    Throughout her career, Chamon has demonstrated a consistent ability to build and lead high-performing cybersecurity teams, while developing cross-functional programs from initial planning through implementation — mitigating risk, ensuring compliance, and delivering strong internal and customer-facing outcomes. Her leadership style emphasizes strategic collaboration, continuous improvement, and mission-focused execution.

    With a sharp analytical mindset and strong data analysis capabilities, Chamon excels at identifying and addressing security vulnerabilities, synthesizing large datasets to drive decision-making, and enhancing long-term security postures. She has successfully performed and overseen numerous security assessments, audits, and readiness reviews, ensuring adherence to critical state, federal, and industry regulations.

    Drawing on her military discipline and leadership acumen, Chamon is known for her ability to mentor emerging security professionals, establish trusted relationships across technical and executive teams, and cultivate a security-first culture. Her hands-on approach and clear communication style make her a valuable contributor to any initiative aimed at elevating security maturity and resilience.

    Chamon holds multiple industry certifications and continues to stay at the forefront of evolving cyber threats, emerging regulations, and risk management strategies. Whether advising senior leadership or leading tactical execution, she brings both vision and operational excellence to every engagement.

  • speaker photo
    Tamika Bass
    Cybersecurity Director, GFT

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Sanat Pattanaik
    Principal Security Architect, ADP

    Sanat is a senior cybersecurity leader with a proven track record of building and scaling enterprise security programs that align with business strategy and enable digital transformation. With deep expertise in Zero Trust, cloud security, and the NIST Cybersecurity Framework, he has successfully led cross-functional teams to secure AI-driven architectures and address emerging risks. A strong advocate of security-by-design, Sanat combines technical acumen with strategic vision to help organizations navigate the evolving landscape of Generative AI securely. As a trusted advisor to executives and boards, he emphasizes embedding security as a business enabler in the AI era.

  • speaker photo
    Phillip Mahan
    Sr. Director, Privacy & Compliance, GoTo Foods

    The boring Bio for Phillip would mention his years of experience in Privacy, Security, Governance, and Audit. It would tell of the business sectors he's worked with, and perhaps even the companies and professional organizations he's been affiliated with for the last 25+ years.

    This is not that Bio.

    Telling stories and pulling connections together from places unexpected; using Poetry, Literature, and Fairy Tales to make points understood by those not in the tech field; and sometimes writing way too strange abstracts—these are the things that make Phillip happy.

    When a group wants him to come up with a talk, his wheels start turning and they don't stop until something is on paper (or on a screen ). The results are usually a journey that leave the listeners somewhere they weren't when the story began.

    Phillip prefers people thinking of him more as someone who looks at the world differently but helps to get you where you need to be.

  • speaker photo
    Jack Bailey
    VP, Channel & Sales Enablement, 11:11 Systems

    Jack Bailey is the Vice President of Sales & Channel Enablement at 11:11 Systems. He is a driven IT sales and learning professional with demonstrated success in management, solving customer challenges and sales enablement. He oversees the alignment of advanced networking protocols, virtualization architecture, and multi-vendor/protocol support of production, testing, and disaster recovery solutions to customer challenges.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes