googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 9, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 216AB

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, April 10, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Building Your Cybersecurity Community: Connections and Career Growth
    speaker photo
    BISO, Bank of America
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: 216CD

    Developing meaningful professional relationships and strategically managing your career are vital for success and advancement in the fast-moving cybersecurity ecosystem. Connections are critical in our lives – we cannot do it alone. This closed-door, interactive session provides perspectives and frameworks for expanding your network both internally and across the industry. Come ready to share and hear proven approaches for becoming a trusted advisor to business leaders while raising the profile of your security team. We’ll discuss techniques to foster connections through conferences, media, and writing while aligning activities to your long-term career roadmap. Participants will leave ready to proactively network with purpose, find and become mentors and sponsors, and chart a fulfilling career trajectory in cybersecurity.

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Lake Norman & Charlotte IT Professionals Joint Meeting [Open to all attendees]
    • session level icon
    Behind the Security Leader: Hidden Figures of Influence
    speaker photo
    Sr. Cybersecurity Manager, Krispy Kreme
    speaker photo
    Deputy CISO, Ingersoll Rand
    speaker photo
    CISO, Belk
    speaker photo
    SVP & CSO / CISO, American Tire Distributors
    speaker photo
    Sr. Director, Information Security Architecture, CISSP, C|CISO, Lowe's
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: 219A

    We frequently spotlight the individual brilliance of high-profile security executives like the CISO when discussing cyber program successes. But rarely do we hear about the mentors, role models, advisors, and champions that propelled leaders to those spotlighted positions. In this revealing panel, influential cybersecurity leaders peel back the curtain to discuss the hidden figures who helped shape their journey, style, and accomplishments as security leaders. Which quiet influencer gave a nudge at a critical career junction or provided wise counsel to avoid pitfalls? What inspiring figure led by example and modeled courageous leadership in turbulent times? Attendees will enjoy hearing personal stories of those who left an indelible, if unseen, mark in empowering leaders.

    8:00 am
    Charlotte Metro ISSA Chapter and Phish Club Meet-and-Greet
    • session level icon
    Open to all attendees
    speaker photo
    President, Charlotte Metro ISSA Chapter
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: 216AB
    Come join the local ISSA chapter and Phish Club members to network, learn about both organizations, and meet your local leadership for the groups.
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote Panel] Defending Democracy: Safeguarding Election Security in 2024
    • session level icon
    speaker photo
    Executive Director, N.C. State Board of Elections
    speaker photo
    Assistant County Manager / CIO, Rowan County, NC
    speaker photo
    Public Information Officer, N.C. State Board of Elections
    speaker photo
    Elections Director, Forsyth County
    speaker photo
    CISO, N.C. State Board of Elections
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    As the United States gears up for the 2024 elections, the critical importance of securing the electoral process is paramount. This keynote panel assembles representatives from North Carolina’s Board of Elections to dissect the evolving landscape of election security – 5 weeks after the state’s primary elections and eight months before the general election, including the Presidential election. From safeguarding voter data to countering cyber threats, the discussion will delve into the multifaceted challenges and innovative solutions that shape the defense of democracy.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] From Frustration to Funding: Securing the Buy-In You Need for Robust Cybersecurity
    • session level icon
    speaker photo
    CISO, Novolex
    speaker photo
    VP & Global CISO, Hanesbrands Inc.
    speaker photo
    Director, Infrastructure & Security, National Gypsum
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 219A

    Do you struggle to convey the criticality of cybersecurity investments to leadership? This session equips you with the tools to move beyond frustration and secure the funding your cybersecurity program needs. Our panelists cover how to:

    • Craft a compelling narrative: Learn how to translate technical jargon into business-relevant risks and ROI-driven justifications.
    • Quantify the cost of inaction: Highlight the potential financial and reputational damage cyberattacks can inflict.
    • Align with business goals: Demonstrate how strong cybersecurity supports key business objectives and initiatives.
    • Use data to your advantage: Leverage industry statistics and relevant case studies to build a data-driven case.
    • Master the art of presentation: Develop presentation skills and communication strategies to resonate with non-technical stakeholders.
    10:15 am
    Fighting the Cyber War with Denial and Deception: Lessons from the Ghost Army
    • session level icon
    speaker photo
    Deputy CISO & Staff VP, Cyber Defense Operations, Centene Corporation
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 216AB
    Denial and Deception is often misunderstood as a problem that needs a purely technical solution. In contrast, World War II highlighted the U.S. Army’s 23rd Headquarters Special Troop (Unit), known as the Ghost Army, which was stood up with the sole purpose of tricking the German Army into attacking a site 10 miles away from the actual location that allied forces would engage. This was accomplished through creating false infrastructure and operations. The basic concept of counterintelligence is to decrease or eliminate an adversary’s ability to collect or operate effectively against you.
    10:15 am
    Global Threat Report: Breaking Down the Tradecraft of Adversaries
    • session level icon
    speaker photo
    Regional Sales Engineer, CrowdStrike
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 219BC

    Join this session that explores CrowdStrike’s seminal report on the world’s most prolific eCrime, nation-state and hacktivist adversaries, their rapidly evolving tradecraft, and the novel cyber threats facing organizations and society at large. Explore the surge in adversaries leveraging stolen identity credentials, exploiting gaps in cloud environments and using interactive intrusion (hands-on-keyboard) tactics to stay under the radar, evade legacy defenses and dramatically accelerate the speed of attacks. This session also uncovers early evidence of adversaries experimenting with – and abusing – generative AI to democratize attacks and lower the barrier of entry for more sophisticated operations. Add in the pending threats to free elections in the U.S. and across the globe, and this year’s session is a must for all!

    10:15 am
    Sysmon 101: Leveling Up Windows Security
    • session level icon
    speaker photo
    Lead Incident Detection Engineer, Blumira
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 218

    Sysmon, a component of Microsoft’s Sysinternals software package, provides a treasure trove of information for Windows logs – but first, you need to know how to tap into it. Sysmon enriches Windows logs beyond what Windows Event Viewer can provide, bringing a higher level of monitoring into certain events like process creation, network connections, file system changes, and more to detect malicious activity. Learn how to use this free resource to its full potential and get better security coverage across your Windows environment.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    [Panel] Working with Law Enforcement Before and After (Inevitable) Cyber Incidents
    • session level icon
    speaker photo
    Special Agent for the Cyber Intrusion Squad, FBI Charlotte Division
    speaker photo
    Senior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
    speaker photo
    Cybersecurity Attorney
    speaker photo
    Advisor to The Identity Theft Resource Center; Founder, Frozen Pii LLC
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 219A

    The adage that “there are only two types of companies: those that have been hacked and those that will be” is just as true today as it was in 2012. Technological advances in wireless technologies and the internet, along with the growth of global criminal organizations, nation-state hackers, and Cybercrime-as-a-Service, have given criminals a potential leg up. It’s more likely than not that your enterprise or SMB business inevitably will fall victim to a “cyber incident.” Cyber-incident preparedness includes knowing when and who to call in the FBI or Secret Service. Our panel of experts offer real-world case studies and tips for partnering with law enforcement.

    11:10 am
    Peering into the Psyche: Understanding the Criminal Hacker Mindset
    • session level icon
    speaker photo
    CISO, AnMed Health
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 216AB

    To truly fortify defenses, security teams must go beyond technical controls and seek to understand what motivates and enables their adversaries. This insightful session pulls back the curtain to examine the psychology and drivers behind malicious hackers and cybercriminals. What personality traits, backgrounds, and belief systems correlate to those drawn into criminal hacking activities? How does rationalization and moral disengagement take hold? The session dissects common personas like state-sponsored actors, profit-driven gangs, hacktivists, and insiders to understand their mental models and risk calculus. The discussion demystifies techniques like social engineering, exploring the psychological levers and triggers leveraged to compromise human targets.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Manager, Detection & Response Services, Rapid7
    speaker photo
    Solutions Architect, Syxsense
    speaker photo
    Solutions Architect, Envision
    speaker photo
    Principal Solutions Architect, Okta
    speaker photo
    VP, Information Security, Essent Guaranty, Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 218

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    11:10 am
    PCI DSS v4.0 Is Here… Now What? – Ask the Expert
    • session level icon
    speaker photo
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 219BC
    The PCI DSS 4.0 compliance deadline has come and gone. The previous PCI Data Security Standard (version 3.2.1) is officially retired, and a multitude of new requirements of PCI DSS 4.0 need to be implemented. Do you have questions regarding the transition to PCI DSS v4.0? Get all your PCI compliance questions answered in this open forum discussion and stay ahead of the curve. Come armed with your PCI questions and learn about the new requirements and what specific steps to take to be compliant.
    12:00 pm
    [Lunch Keynote Panel] New Risks for CISOs: The Downstream Effects of New SEC Regulations
    • session level icon
    speaker photo
    Former CISO, The Clorox Company
    speaker photo
    Head of Cybersecurity and Compliance, Denny's
    speaker photo
    CISO, Premiere, Inc.
    speaker photo
    National Director – Cyber Risk Center of Expertise, Jefferson Wells
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    As cybersecurity professionals grapple with an ever-evolving threat landscape, the introduction of new SEC regulations adds a layer of complexity to their strategic considerations. This session dives deep into the downstream effects of recent SEC regulations. Explore the nuanced risks these regulations pose, dissect the potential impact on cybersecurity protocols, and strategize ways to fortify your organization’s defenses against emerging challenges. Led by seasoned experts, this session aims to equip CISOs with the knowledge and insights needed to proactively navigate the uncharted waters of new SEC regulations.
    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite only)
    • session level icon
    Safeguarding Your Crown Jewels, No Matter How You Access Them
    speaker photo
    CISO, Americas, Zscaler
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: 216CD
    Your networks and data are the lifeblood of your organization, making them prime targets for cyber attackers. But how do you ensure these vital assets remain secure in our hyper-connected world? In this interactive roundtable discussion, come ready to share with other cybersecurity leaders approaches for hardening cyber defenses and implementing robust data protection controls as we chat about moving from legacy to more modern solutions.
     
    Possible discussion points include proven strategies around network segmentation, micro-segmentation, zero-trust architectures, and more. Share and hear insights into leveraging secure remote access to extend secure connectivity for remote workers while minimizing attack surfaces. Share real-world use cases on deploying, managing, and monitoring enterprise solutions effectively, whether your organization is in finance, manufacturing, or even a non-profit with tight budgets.
     
    Beyond preventative measures, be ready to discuss capabilities for rapid detection of network/data breaches and decisive incident response procedures. Participants will swap practical tips on securing data in the cloud, implementing data loss prevention (DLP), and meeting compliance mandates.
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Cybersecurity Maturity Model Certification (CMMC) 2.0: Raising the Bar
    • session level icon
    speaker photo
    National Director – Cyber Risk Center of Expertise, Jefferson Wells
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: 219BC

    In today’s ever changing digital landscape, organizations must be prepared to deal with the increasing threat landscape and associated cyber risks. In response to this, the federal government has introduced the Cybersecurity Maturity Model Certification (CMMC). This standard incorporates a number of best practices and security standards into a grading scale of maturity against which an assessed organization can be compared. It is designed to enforce protection of sensitive unclassified information that is shared by the Department of Defense with their suppliers, contractors, and subcontractors. As the proposed final rule was published on December 26, 2023, it is only a matter of time before companies doing business either directly or indirectly with the DoD will be required to obtain a CMMC certification prior to contract award. It has been estimated that over 220,000 companies with be impacted by this requirement, so in a multi-tier supply chain you may be subject to this cybersecurity standard and not even know it. In this informative session, you will learn how CMMC 2.0 may impact your organization, the differences between Level 1, Level 2, and Level 3 attestation, the steps you should be taking now to prepare, and the pitfalls to avoid.

    1:15 pm
    The Philosophical Foundation to Securing a Cyber Insurance Rider
    • session level icon
    speaker photo
    CIO / ITS Director, City of Rock Hill, SC
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: 216AB

    Anyone that attempts to acquire a Cyber or Ransomware Insurance rider these days is being challenged and often denied coverage, or worse case, being charged exorbitant fees to obtain the coverage. Many of the headaches in becoming insured can be alleviated by simply having a philosophy of cybersecurity first. Structuring your entire IT operations to be centric to and designed around security first, making an insurance rider application process just another audit form to fill out. This session will review a proven approach to process and structure whereby cybersecurity isn’t an afterthought, but the starting point.

    1:15 pm
    [Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial Intelligence
    • session level icon
    speaker photo
    Cybersecurity & Compliance Manager, Flow Control Group, Perception Point
    speaker photo
    Head of Security Research, Normalyze
    speaker photo
    Lead Cybersecurity Consultant, vCISO, AccessIT Group
    speaker photo
    Regional VP of Sales – East, LightBeam.ai
    speaker photo
    SVP, Americas, Forcepoint
    speaker photo
    Head of Cybersecurity Technology, Truist
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: 219A

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    1:15 pm
    State of the Union: 2023-24 Threat Insights
    • session level icon
    speaker photo
    Sr. Director, DFIR & Threat Intelligence, GuidePoint
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: 218
    Receive insight into the current threat landscape based on recent incidents and response efforts by the GuidePoint Security Incident Response and Threat Intelligence teams. We’ll talk about various threat groups, ransomware actors, attack trends, response engagements, and leave the participants with thoughts on future threats as well as general recommendations for protecting their organizations in 2024 and beyond.
    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Insider Threat Actors & Artificial Intelligence
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: 218

    Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

    This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.

    Objectives:

    • Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
    • Learn how to identify system and user-based behavioral indicators.
    • Learn which existing or enhanced security layer can provide insider threat profile data.

    Take-Aways:

    • How to identify business processes which can contribute to intentional or unintentional insider threats.
    • Enhance procedures required to identify insider threat exposures.
    • Enhance awareness training to include additional methods of insider threat.
    • Enhance existing physical and digital security layers to better identify specific insider threat activity.
    2:10 pm
    Security as a Team Sport
    • session level icon
    speaker photo
    CISO, MercuryGate International
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: 216AB

    Today’s sophisticated cyber threats demand a united front: your organization as a team. This session empowers you to build a winning team, where every player contributes and collaboration reigns supreme. This session breaks down how to:

    • Identify the key players: From boardroom to frontline, understand the roles individuals must play in your security strategy.
    • Break down silos: Bridge the gap between IT, business units, and employees to foster proactive communication and information sharing.
    • Build a culture of security: Implement strategies that encourage awareness, training, and responsible behavior across the organization.
    • Embrace technology: Explore tools and platforms that facilitate collaboration, incident response, and team-based decision-making.
    • Learn from the pros: Discover real-world success stories and gain actionable insights for building your own winning security team.
    2:10 pm
    [Panel] Elevating Security Through Threat Intelligence, Cloud Resilience, and AI Innovations
    • session level icon
    speaker photo
    Sr. Solution Architect, Picus Security
    speaker photo
    Solutions Engineer, Wiz
    speaker photo
    Solutions Architect, CyberArk
    speaker photo
    Solutions Engineer, Claroty
    speaker photo
    Cloud Security Sales Specialist, Check Point Software Technologies
    speaker photo
    Senior Sales Engineer, Thales
    speaker photo
    vCISO, Confidential
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: 219A
    Unlock the secrets to fortified digital defenses and proactive cybersecurity leadership in our compelling panel session. Join us for a deep dive into the strategic integration of threat intelligence, cloud resilience, and cutting-edge AI innovations, unraveling their pivotal roles in the contemporary threat landscape. This isn’t just a discussion; it’s your gateway to actionable insights that will empower you to not only stay abreast of the cybersecurity curve but surge ahead as a strategic leader in the realm of digital security.
     
    Key session highlights:
    • Strategic Threat Intelligence Deployment: Learn how to strategically harness threat intelligence to decipher, anticipate, and proactively respond to the ever-evolving cyber threat landscape.
    • Cloud Resilience Strategies: Explore innovative approaches to fortifying your cloud infrastructure, ensuring resilience in the face of emerging threats and disruptions.
    • AI-Powered Security Innovations: Dive into the realm of AI-driven cybersecurity innovations and discover how artificial intelligence is transforming threat detection, response, and overall security posture.
    • Real-world Case Studies: Gain insights from real-world case studies showcasing successful integrations of threat intelligence, cloud resilience, and AI innovations, providing tangible examples for implementation.
    • Optimizing Security Leadership: Elevate your role as a security leader by understanding how to navigate the complexities of contemporary cybersecurity challenges, fostering a proactive and resilient security posture.
    2:10 pm
    The State of Ransomware
    • session level icon
    speaker photo
    Chief Security & Trust Officer, Halcyon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: 219BC

    Take a walk through the latest trends in the ransomware game and explore the RaaS and Data Extortion economy and emerging trends.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Sponsored by Gurucul
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 4:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    Generously sponsored by:

    3:30 pm
    [Closing Keynote] Understanding How Principles of Threat Intelligence Can Improve Use of AI
    • session level icon
    speaker photo
    VP, Information Security, Centene Corporation
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    As organizations find new ways to leverage AI to analyze or generate information, there arise risks of inaccuracies, bias, or AI hallucinations to the output that could impact business decisions. 

    There are decades-old practices (if not longer) by intelligence communities on how to collect, process, and synthesize data to make informed decisions based on accurate and relevant data.  These can apply to use with GenAI.

    This discussion will talk about how to leverage these techniques and account for characteristics of data such as its completeness and timeliness; as well as attributes like volume and variety when analyzing output from GenAI prompts.  The goal is to reduce risk of making decisions based on inaccurate or incomplete data.

Exhibitors
  • Abnormal Security
    Booth: 400

    Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
    Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

    Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

  • AccessIT Group
    Booth: 400

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • AppOmni
    Booth: 215

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user

  • Aqua Security
    Booth: 260

    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

  • Axonius
    Booth: 210

    Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

  • Blumira
    Booth: 410

    Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.

    Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

  • Cato Networks
    Booth: TBD

    Cato Networks pioneered the convergence of networking and security into the cloud. Aligned with Gartner’s Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks, Cato’s vision is to deliver a next generation secure network architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Our cloud-native architecture enables Cato to rapidly deploy new capabilities and maintain optimum security posture, without any effort from the IT teams. With Cato, your IT organization and your business are ready for whatever comes next. For more information, visit https://www.catonetworks.com.

  • Charlotte IT Professionals
    Booth: TBD

    We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.

  • Charlotte Metro ISSA
    Booth: 110

    The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.

  • Check Point Software Technologies
    Booth: 407

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Claroty
    Booth: 430

    Claroty empowers organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, threat detection, and secure remote access. Backed by the world’s largest investment firms and industrial automation vendors, Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America.

  • Cloudflare
    Booth: TBD

    Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

    Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations—from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.

    Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest internet trends and insights at radar.cloudflare.com.

  • Cloud Security Alliance Charlotte Chapter
    Booth: 185

    CSA chapter membership allows opportunities for continued learning, security awareness, networking, and career growth.

    • Network with peers and subject matter experts
    • Gain valuable insight from industry professionals and peers
    • Build cloud security awareness at the community level
    • Participate in cloud security education and training locally
    • Participate in CSA research and development
    • Discuss cloud vulnerabilities and brainstorm solutions
    • Be a leader in the cloud security field
    • Member discounts on training and exams
  • Cofense
    Booth: 130

    Cofense® provides the world’s most effective email threat detection and remediation solutions. Cofense PhishMe® and the Cofense Phishing Detection and Response Platform (PDR), are powered by over 35 million Cofense-trained employees who report phishing and other dangerous email threats in real time. Exclusive to Cofense, our network detects and eradicates threats other email security systems miss and removes them from our customer inboxes. For more information, visit www.cofense.com or connect with Cofense on X and LinkedIn.

  • Contrast Security
    Booth: 400

    Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.

  • Cribl
    Booth: 315

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • CrowdStrike
    Booth: 415

    CrowdStrike sets the standard for cybersecurity in the cloud era. The CrowdStrike Falcon® platform protects and enables the people, processes, and technologies that drive modern enterprise, delivering superior protection, better performance, reduced complexity, and immediate time-to-value. CrowdStrike secures the most critical areas of enterprise risk—endpoints and cloud workloads, identity, and data—to keep organizations ahead of today’s adversaries and stop breaches.

  • CyberArk Software
    Booth: 240

    CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

  • Cyware
    Booth: 545

    Cyware helps enterprises transform security operations while breaking through silos for threat intelligence sharing, collaboration, and automated threat response. Its unique Cyber Fusion solutions enable lean security teams to proactively stop threats, connect the dots on security incidents, dramatically reduce response time, and reduce analyst burnout from repetitive tasks. Cyware improves security outcomes for enterprises, government agencies, and MSSPs, and provides threat intelligence sharing platforms for the majority of ISAC/ISAO information sharing communities globally.

  • deepwatch
    Booth: 520

    deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry. Designed to be different, deepwatch provides customers with world-class managed security services and unrivaled value by extending their cybersecurity teams, curating leading technologies into deepwatch’s cloud SecOps platform, and proactively driving their SecOps maturity.

  • Delinea
    Booth: 525

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • Dragos
    Booth: 515

    Dragos has a global mission to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos’s industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available. 

    Our solutions protect organizations across a range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical. Dragos is privately held and headquartered in the Washington, DC area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East. 

  • Envision Technology Advisors
    Booth: 140

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • F5
    Booth: 250

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • Exabeam
    Booth: 560

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Forcepoint
    Booth: 325

    Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behavior as they interact with critical data and systems. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform, protecting the human point for thousands of enterprise and government customers. Our solutions include Cloud Security, Network Security, Data & Insider Threat Security.

  • Gigamon
    Booth: 540

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • GuidePoint Security LLC
    Booth: 500

    GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com

  • Gurucul
    Booth: microsite only

    Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Cloud-native Next-Gen Security Analytics and Operations Platform provides customers with Next Generation SIEM, UEBA, Open XDR, and Identity & Access Analytics. It leverages machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent data breaches, fraud and insider threats. It also reduces the attack surface for accounts and eliminates unnecessary access rights and privileges to increase data protection.

    Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cybersecurity. The company was founded in 2010 by seasoned entrepreneurs with a proven track record of introducing industry-changing enterprise security solutions. Gurucul’s mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

    Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise. It is also used for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. Gurucul is headquartered in Los Angeles, CA.

  • Halcyon, Inc
    Booth: TBD

    Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. Halcyon’s core platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes. To learn more and get a demo, contact us today.

  • Invicti
    Booth: 505

    Invicti Security is transforming the way web applications are secured. An AppSec leader for more than 15 years, Invicti enables organizations in every industry to continuously scan and secure all of their web applications and APIs at the speed of innovation. Invicti provides a comprehensive view of an organization’s entire web application portfolio, and powerful automation and integrations enable customers to achieve broad coverage of even thousands of applications. Invicti is headquartered in Austin, Texas, and serves more than 3,500 organizations of all sizes all over the world.

  • ISACA Charlotte
    Booth: 170

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

  • Charlotte Metro ISC2
    Booth: 160

    The Charlotte Metro ISC2 chapter is a 501c3 non-profit organization, whose mission is to advance information security in the local communities throughout the Charlotte Metro area. We provide our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate. We are committed to engaging in public service activities and outreach to advance cybersecurity awareness in the broader community.

  • Island
    Booth: 400

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • Ivanti
    Booth: 550

    Ivanti Supply Chain helps organizations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. The company also unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data center, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. Ivanti is headquartered in Salt Lake City, Utah and has offices all over the world.

  • Keeper
    Booth: 555

    Manage, protect and monitor all your organization’s passwords, secrets and remote connections with zero-trust security.

  • Keyfactor
    Booth: 180

    Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale—and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. For more, visit keyfactor.com or follow @keyfactor.

  • Kiteworks
    Booth: 320

    Kiteworks’ mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive content. To this end, we created a platform that delivers content governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive content moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive content communications.

  • Lake Norman IT Professionals
    Booth: 445

    Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!

  • LightBeam.ai
    Booth: 400

    LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.

  • Magna5
    Booth: 190

    Magna5 provides managed IT services, cybersecurity, private and public cloud hosting, backup and disaster recovery and other advanced IT services to mid-market and enterprise customers, including leaders within the education, healthcare, government, financial services, manufacturing, and other industry segments. Headquartered in Pittsburgh, PA, Magna5 has customers nationally. Magna5 is a NewSpring Holdings platform company.

  • Netwrix
    Booth: 305

    Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact.
    More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

  • Normalyze
    Booth: 400

    We are solving some of the most painful problems enterprise IT security teams face in cloud and data security space. We are a relatively small team of dedicated, self-driven, self-managed engineers who value:

    * focus, commitment and pragmatism in our actions
    * honesty and integrity in all our interactions
    * efficiency, trustworthiness and excellence as a way of life

  • Okta
    Booth: 335

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • OpenText Cybersecurity
    Booth: 245

    OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience, and simplified security to help manage business risk.

  • Optiv
    Booth: 300

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Ordr
    Booth: 125

    In the hyper-connected enterprise, in which everything from simple IoT devices to complex multi-million-dollar systems are connected, traditional agent-based and human-generated security models simply cannot scale. Ordr solves this problem, providing enterprises with complete visibility and exhaustive control over every class of network-connected device and system. The Ordr Systems Control Engine is the only purpose-built solution to fully map the device flow genome at massive scale, using machine learning to completely and continuously inspect, classify and baseline the behavior of every device. Ordr’s software architecture is unique in its ability to process enormous quantities of data in real-time, using sophisticated AI to deliver closed loop security, automatically generating policies for each class of device and implementing those policies directly through the organization’s existing multi-vendor network and security infrastructure.

  • Palo Alto Networks
    Booth: 425

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Perception Point
    Booth: 490

    Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organization’s main attack vectors – email, web browsers, and cloud collaboration apps. The solution’s natively integrated and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations.

    Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems to prevent phishing, BEC, spam, malware, zero-days, ATO, and other advanced attacks well before they reach end-users. Fortune 500 enterprises and organizations across the globe are preventing attacks across their email, web browsers and cloud collaboration channels with Perception Point.

    Our unique technology which uses 7 advanced detection layers to provide a single verdict in just seconds, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves hundreds of global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, Finance, Insurance and more.

  • Phish Club
    Booth: 165

    Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.

    Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!

  • Picus Security
    Booth: 528

    Picus Security is the pioneer of Breach and Attack Simulation (BAS). The Picus Complete Security Control Validation Platform is trusted by leading organizations worldwide to continuously validate the effectiveness of security controls against cyber-attacks and supply actionable mitigation insights to optimize them.

    Picus has offices in North America, Europe and APAC and is supported by a global network of channel and alliance partners. The company is dedicated to helping security professionals become more threat-centric and via its Purple Academy offers free online training to share the latest offensive and defensive cybersecurity strategies.

  • Rapid7
    Booth: 235

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • ReversingLabs
    Booth: 510

    ReversingLabs automatically detects and analyzes sophisticated file-based threats built to evade security controls from development to the SOC. Our hybrid-cloud Titanium Platform verifies binaries at the speed, accuracy, and scale required for software development, third-party software acceptance, and security operations teams to take confident action. Learn more at www.reversinglabs.com.

  • Semperis
    Booth: 255

    Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

  • SIM Charlotte
    Booth: 120

    The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:

    • Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
    • Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
    • Challenging our comfort levels by exchanging ideas with peers and business counterparts.
    • Being a resource for each other, and personal networking.
  • Snyk
    Booth: 230

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • Stratascale
    Booth: 205

    As a digital and cyber security services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. Our purpose is to help clients realize their vision and create value, faster. We call it Digital Agility.

    From attack surface control to modern vulnerability management, stop by our booth to see how we’re shaping the future of digital business and a more secure world.

  • Sumo Logic
    Booth: 400

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Synopsys
    Booth: 225

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • Syxsense
    Booth: 145

    Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.

  • Tanium
    Booth: 310

    Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).

    The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.

    For more information, visit: https://www.tanium.com.

  • Tevora
    Booth: 150

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Thales
    Booth: 400

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: 220

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS North Carolina Affiliate
    Booth: 115
  • Wiz
    Booth: 529

    We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights  that don’t waste time.

    Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.

  • Zscaler
    Booth: 420

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Rob Dalzell, Moderator
    BISO, Bank of America

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte, and enjoys connecting with others that work in Cybersecurity. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. He is an ardent believer in life-long learning. In his spare time, he can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house, and trying to keep a British sports car running.

  • speaker photo
    Misty Haynes
    Sr. Cybersecurity Manager, Krispy Kreme
  • speaker photo
    Sherri Leach
    Deputy CISO, Ingersoll Rand

    Sherri Leach is a proven tactical and strategic innovator, harnessing over 27 years of technical leadership experience across multiple fields within cybersecurity. She is currently the Deputy CISO at Ingersoll Rand, and has previously served in operations and engineering roles at Trane Technologies, MITRE, and ManTech.

    Her skills have been applied across both public and private industry, including Fortune 500 companies, the US Intelligence Community, and the United States Federal Government. Sherri holds an MS in Information Systems and certifications from SANS Technology Institute.

  • speaker photo
    Neda Pitt
    CISO, Belk
  • speaker photo
    Kimberly Trapani
    SVP & CSO / CISO, American Tire Distributors
  • speaker photo
    James Kimble, Moderator
    Sr. Director, Information Security Architecture, CISSP, C|CISO, Lowe's
  • speaker photo
    Brent Bigelow, Host
    President, Charlotte Metro ISSA Chapter

    Brent is a seasoned Cybersecurity Leader with 36+ years of IT and Information Security experience and a passion for enhancing Cybersecurity through awareness training, architecture design, thought leadership, policy, people, process, and technology. He has worked in many industries including healthcare, aviation, financial, government, automotive, startups, insurance, and manufacturing. Having performed the roles of Chief Information Security Officer, Director of IT, Security Architect, individual contributor, consultant, hands on management positions and he understands the importance of providing secure solutions while enabling the business function. In his spare time, he is an avid Jeep enthusiast and participates in Jeep Offroad events around the country!

  • speaker photo
    Karen Brinson Bell
    Executive Director, N.C. State Board of Elections

    Karen Brinson Bell has served as executive director of the North Carolina State Board of Elections since June 2019. She has worked in elections administration since 2006 in county, state, and national roles. As North Carolina’s chief elections official, she leads about 65 full-time employees at the state agency, which is charged with administering elections and campaign finance compliance, overseeing the 100 county boards of elections, and ensuring voting for more than 7 million voters.

    Karen was born and raised in Kenansville in Duplin County, N.C., where her father was mayor. In 1996, she graduated from the University of North Carolina at Asheville, with a double major in mass communication and political science.

  • speaker photo
    Randy Cress
    Assistant County Manager / CIO, Rowan County, NC

    Randy J. Cress is the Assistant County Manager and Chief Information Officer for Rowan County, bringing over two decades of service in enhancing government technology and digital strategies. As CIO since October 2015, he has led the development of a fully virtualized data center and the adoption of cloud services to improve efficiency. His work involves collaboration across 22 county departments and local public safety agencies, focusing on integrating technology to support public services. Randy holds a Master's in Public Administration from Appalachian State University and a BBA in Information Technology from Catawba College, alongside a Certified Government Chief Information Officer certification from UNC Chapel Hill. He is a member of the North Carolina Joint Cyber Task Force, contributing to local government cybersecurity efforts.

  • speaker photo
    Patrick Gannon
    Public Information Officer, N.C. State Board of Elections

    Patrick Gannon is the public information director at the State Board of Elections. He has served in this role since since October 2016, just before the presidential election. His responsibilities include managing the State Board website, drafting press releases and social media content, responding to public records requests, and answering questions from the media, county boards of elections, and voters.

    Pat came to the State Board after a 17-year career in journalism, most recently as editor of The Insider State Government News Service and syndicated columnist covering state politics for the Capitol Press Association. Before that, he worked as a reporter and editor for the Wilmington, N.C., Star-News and a reporter for the Utica Observer-Dispatch in upstate New York. In 2004, he reported from Iraq while embedded with a N.C. National Guard unit. He is a 1999 graduate in communications and mass media from Kent State University in Ohio. He lives in Raleigh with his daughter.

  • speaker photo
    Tim Tsujii
    Elections Director, Forsyth County

    Tim Tsujii is the elections director for Forsyth County. Prior to joining Forsyth County, Tsujii worked at the Guilford County Board of Elections from 2005 to 2016, serving as early voting director and eventually deputy director of elections.

    He leads an organization responsible for conducting elections in Forsyth County, maintaining voter records, verifying petitions, and auditing campaign finance reports. The election staff also recruits and trains poll workers, secures adequate polling places, tests and maintains voting equipment, and audits ballots cast to ensure the accuracy of election results.

    Tsujii strives to improve voter services in Forsyth County through innovation. His office, in collaboration with MapForsyth and Forsyth County MIS, implemented a polling place wait time tracking application in the 2016 general election that was the first of its kind in the state. The application allows voters to see how long current wait times are at each polling place during early voting and also provides turn-by-turn directions to the nearest voting site. The three departments were recognized by the North Carolina Center for Geographic Information Analysis in 2017 for the implementation of this innovative tool.

    In 2014, Tsujii earned his professional election certification through the national Election Center and Auburn University Certified Elections and Registration Administrator (CERA) program. He has also been a Certified North Carolina Elections Administrator through the North Carolina State Board of Elections since 2009. Tsujii earned his Bachelor of Arts in Political Science from George Washington University and his Master of Public Affairs from the University of North Carolina at Greensboro.

  • speaker photo
    Christine Weber
    CISO, N.C. State Board of Elections

    Christine Weber recently joined the NC State Board of Elections team as the Chief Information Security Officer. With over 20 years of experience in Information Technology and Cybersecurity, she brings a wealth of knowledge to her role. Her expertise spans both the Defense and Academic Industries, where she has contributed significantly to safeguarding critical systems and data.

    In addition to her civilian work, Christine continues to serve her country as an Air Force Reservist and a member of the Civil Air Patrol. Her commitment to national security extends beyond her professional responsibilities.

    Christine holds an MBA from Capella University, a BS in Aeronautics from Embry-Riddle Aeronautical University and holds multiple certifications to include the CISSP.

  • speaker photo
    Matthew Burroughs
    CISO, Novolex
  • speaker photo
    John Opala, PhD
    VP & Global CISO, Hanesbrands Inc.

    Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.

  • speaker photo
    Thomas Watson, CISM, CISSP
    CISO, isolved HCM

    Tom Watson has more than 25 years of experience in Information Risk Management and Security. His focus is on enabling businesses to be more productive while not losing focus on security and integrity of key corporate data. He has knowledge and experience working for multinational organizations as well as having fulfilled international assignments.

    Tom is currently the CISO for isolved HCM, which is a private equity owned software company with approximately 2,500 employees headquartered in Charlotte, NC. Prior to isolved, he was CISO for Sealed Air Corporation. Previous employers include Thermo Fisher Scientific, Bayer, Kuhn & Nagle, Disney/ESPN, Oxford Health Plans, and the NASDAQ Stock Market. His education includes a BS in Management and AS in both Business Administration and Aviation Technology obtained from Embry Riddle Aeronautical University.

    Tom was an adjunct professor at Southern Connecticut State University in the School of Business teaching students focusing on degrees in Management and Management Information Systems. He has maintained his CISM (Certified Information Security Manager from ISACA) and CISSP (Certified Information Systems Security Professional from ISC2) professional security certifications since 2003. He is a veteran of the Army National Guard and is also a certified volunteer firefighter with 10 years of active service.

  • speaker photo
    Mike Brannon, Moderator
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Charles Garzoni
    Deputy CISO & Staff VP, Cyber Defense Operations, Centene Corporation

    Charles Garzoni is deputy CISO Centene Corporation and responsible for cyber defense operations. His career spanned multiple industries, law enforcement, and the military specializing in building teams to investigate, analyze, and attribute both nation-state and criminal cyber attacks. Over his career he has worked hundreds of high-profile incidents (such as Sony, OPM, Anthem, NASDAQ) and helped design and execute cyber operations against adversaries.

    He has held several significant positions within the government including, Incident Response Director and Cyber Incident Coordinator for the FBI Cyber Division, and Chief of Threat Analysis for the (NCIJTF). He was also appointed as the Director of Defensive Strategy for the US Cyberspace Solarium Commission and retired as a senior leader with the Air Force Office of Special Investigations (OSI) where he focused on cyber investigations, operations, and cyber strategy.

  • speaker photo
    Justin Jordan
    Regional Sales Engineer, CrowdStrike

    As a skilled cybersecurity specialist with over 15 years of experience, Justin has honed his expertise in privileged access, identity security, and Endpoint Security Solutions. His background spans various industry-leading companies, including BeyondTrust, FireEye, and CrowdStrike. As a subject matter expert and advisor, he has contributed to the development of security solutions and offered best practices guidance for prominent global clients. His diverse experience encompasses network engineering, vulnerability assessments, and working as a Senior Engineer with an MSSP, equipping him with a comprehensive understanding of the cyber threat landscape.

  • speaker photo
    Amanda Berlin
    Lead Incident Detection Engineer, Blumira

    Amanda Berlin is Lead Incident Detection Engineer at Blumira, bringing nearly two decades of experience to her position. At Blumira, she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform.

    An accomplished author, speaker, and podcaster, Amanda is known for her ability to communicate complex technical concepts in a way that is accessible and engaging for audiences of all backgrounds. She co-authored an O’Reilly Media book Defensive Security Handbook: Best Practices for Securing Infrastructure, a comprehensive guide for starting an infosec program from the ground up. She has presented at various industry events, including Blueteam Con, RSA Conference, and DEFCON. She is also co-host of Brakeing Down Security, a podcast about the world of cybersecurity, privacy, compliance, and regulatory issues that arise in today’s workplace.

    Amanda is the CEO and co-founder of Mental Health Hackers, a non-profit organization that aims to raise awareness about mental health issues in the cybersecurity community. Through Mental Health Hackers, Amanda is working to break down the stigma surrounding mental health and create a supportive community for cybersecurity professionals. Passionate about educating others, Amanda frequently develops courses and leads tabletop sessions through organizations such as Antisyphon Training and Wild West Hackin' Fest.

    Amanda is on multiple social media platforms as @InfoSystir, where she can be found sharing information security news, cracking jokes, and expressing her love for hedgehogs.

  • speaker photo
    Brian Cyprian
    Special Agent for the Cyber Intrusion Squad, FBI Charlotte Division

    Brian N. Cyprian has been the supervisor for the FBI’s Charlotte Cyber Task Force since March 2016. He worked at FBI Headquarters managing national security computer intrusion investigations prior to arriving in Charlotte. Brian has a B.S. in Computer Information Systems and an MBA in Commerce from Texas A&M University.

  • speaker photo
    McClellan 'Mac' Plihcik
    Senior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
  • speaker photo
    Matt Warren
    Cybersecurity Attorney
  • speaker photo
    Tom O'Malley, Moderator
    Advisor to The Identity Theft Resource Center; Founder, Frozen Pii LLC

    Tom O’Malley is the founder of FrozenPii.com, a public service website promoting free security credit freezes and help for identity theft victims. He also serves as a consultant to the non-profit Identity Theft Resource Center. Previously, Tom was a career state (5 years) and federal prosecutor (32 years) in South Florida and Western North Carolina. His specialized legal experience included working as an Organized Crime Drug Enforcement Task Force Coordinator, Computer Hacking and Intellectual Property (CHIP) Coordinator and Identity Theft Coordinator. Tom also pioneered the use of historical cell site analysis in criminal trials beginning in 2010, and served as an instructor at the U.S. Department of Justice’s National Advocacy Center on the subjects of trial advocacy, searches of electronic devices, electronic evidence and cybercrime training, intellectual property litigation and cell site location analysis. Tom worked with hundreds of criminals as cooperators and government witnesses, and conducted over 200 jury trials during his prosecutorial career.

  • speaker photo
    Scott Dickinson
    CISO, AnMed Health

    Scott Dickinson is passionate about Information Technology and Information Security and has over 20 years in the fields of information security and information technology. He has worked with Federal and State governments to include FBI, DOD, Veteran Affairs, State of SC, and the private sector. He has been a CIO, a CISO, a virtual CISO, Cyber Security Division Director and a variety of positions leading up to those roles. He currently serves as the CISO at AnMed. He enjoys being exceptional as a security leader and is constantly looking for ways to improve the security posture of companies. He currently holds the CISSP and CCSP certifications.

  • speaker photo
    Lonnie Best
    Manager, Detection & Response Services, Rapid7

    Lonnie Best has spent over 13 years in security, with his introduction to the field working physical security at a commercial nuclear power generating plant, and the last 6+ of those years helping organizations detect and respond to security incidents as part of Rapid7's Managed Detection and Response (MDR) practice. His experience during that time is wide-ranging, including everything from responding to low-impact commodity malware, to working large-scale Incident Response engagements against advanced cyber criminal and nation state threat actors. Currently, Lonnie leads a team of world-class threat analysts in Rapid7 MDR's flagship Security Operations Center in Arlington, Virginia.

  • speaker photo
    Rocco Fiore
    Solutions Architect, Syxsense

    Rocco Fiore is a Solutions Engineer at Syxsense. Rocco has an eclectic experience profile within IT and Security, helping customers over the past seven years successfully implement transformational technologies in the areas of network security, wireless communications, and endpoint security. Experienced as a customer advocate and technical expert, he currently holds the Security+, CySA+, CCNA, and Microsoft Azure Administrator certifications.

  • speaker photo
    Jay Longley
    Solutions Architect, Envision

    Jay is a seasoned tech professional with over 27 years of experience in the industry, including a remarkable 14-year tenure as CEO. His accomplishments have garnered him prestigious national and state-level awards, notably earning the title of Businessman of the Year in the State of Rhode Island.

    After successfully selling his previous company, Jay transitioned to Envision where he spearheaded the development of the State, Local, and Education division. His influence extends far beyond the boardroom as he collaborates closely with key figures such as Mayors, CEOs, Superintendents, Executive Directors, and Board of Directors. Jay's expertise in cybersecurity is particularly noteworthy as he plays a role in the Joint Cyber Task Force and serves on Envision's CxO team.

    As a Solution Architect and Breach Coach on the Incident Response Team, Jay is at the forefront of combating cyber threats, regularly sharing his insights on platforms ranging from local news channels to prominent conferences. His proficiency in deploying zero trust and designing cybersecurity solutions has been instrumental in safeguarding the operations of governments, non-profits, schools, publicly traded companies, and many more.

    Jay's dedication to professional development is evident through his Microsoft and AI/Prompt Engineering certifications, and is actively completing his CISO certification. Beyond his professional pursuits, Jay finds joy in his role as a father to three children and indulges his passion for aviation as both a Pilot and Seaplane Pilot in his spare time.

    A Rhode Island resident recently residing in Costa Rica with his wife, 5-year-old daughter, and a rescue dog they found in Eleuthera, Jay continues to balance his professional commitments with a rich personal life filled with adventure and family.

  • speaker photo
    Steve McCullar
    Principal Solutions Architect, Okta

    Steve McCullar is a Principal Solutions Architect at Okta. In this role, Steve advises Okta's customers and prospects on how Okta's solutions will help them solve complex Identity and Access related issues. Steve has more than 30 years of experience in crafting Identity and Access based solutions for customers, including almost six years at Okta, and has extensive experience in risk reduction strategies.

  • speaker photo
    James Keegan, Moderator
    VP, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Chad Barr
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group

    Chad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.

    As a visionary leader in the realm of cybersecurity, Chad has honed his skills across multiple disciplines, including security engineering, project management, risk management, and compliance. His extensive background underscores his ability to guide organizations toward robust and resilient security postures.

  • speaker photo
    Amy Bogac
    Former CISO, The Clorox Company

    Amy Bogac was most recently the CISO and Vice President of Enterprise Security and Infrastructure at The Clorox Company. With a passion for securing great brands, Amy previously led the Global Information Security and Infrastructure department for CF Industries, was the Director of IT Security Operations for the Walgreen Company, a member of Walgreens Boots Alliance, and was also a founding member of the IT Security Department at the Kellogg Company. Amy holds an MBA from Lake Forest Graduate School of Management, a BA from St. Xavier University, and achieved her CISSP from ISC2 more than 10 years ago.

  • speaker photo
    Chris Collins
    Head of Cybersecurity and Compliance, Denny's
  • speaker photo
    Ben Schwering
    CISO, Premiere, Inc.
  • speaker photo
    Stephen Head, Moderator
    National Director – Cyber Risk Center of Expertise, Jefferson Wells

    As the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both published by Thomson Reuters. He served as International Chair of the ISACA Standards Board and as a Director on the ISACA international Board, was a Commissioner on the AICPA National Accreditation Commission, and served on the AICPA Information Technology Executive Committee at the National level. Stephen has spoken at numerous national and international events, including the IIA International Conference and the Association of Certified Fraud Examiners (ACFE) Annual Global Conference. He is a CPA, CISSP, CISM, CDPSE, QSA, PCIP, CMA, CFE, CISA, CGEIT, CRISC, CBCP, MCSE, CHP, CHSS, CITP, CGMA, CPCU, and holds an MBA from Wake Forest University.

  • speaker photo
    Benjamin Corll, Moderator
    CISO, Americas, Zscaler

    Ben is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, and CISO roles.

    Prior to joining Zscaler, Ben was the VP/Head of Cybersecurity (CISO) for Coats, a global manufacturer of industrial thread. This was a newly created role that allowed Ben to build a program: from policies, creating and refining processes, to choosing technology controls. Ben is passionate about engaging with both security practitioners and business leaders on the value of digital transformation and preparing businesses to defend against threats. Much of his time is spent focusing teams on the fundamental practices or basics and doing them well before pivoting to more advanced solutions.

  • speaker photo
    Stephen Head
    National Director – Cyber Risk Center of Expertise, Jefferson Wells

    As the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both published by Thomson Reuters. He served as International Chair of the ISACA Standards Board and as a Director on the ISACA international Board, was a Commissioner on the AICPA National Accreditation Commission, and served on the AICPA Information Technology Executive Committee at the National level. Stephen has spoken at numerous national and international events, including the IIA International Conference and the Association of Certified Fraud Examiners (ACFE) Annual Global Conference. He is a CPA, CISSP, CISM, CDPSE, QSA, PCIP, CMA, CFE, CISA, CGEIT, CRISC, CBCP, MCSE, CHP, CHSS, CITP, CGMA, CPCU, and holds an MBA from Wake Forest University.

  • speaker photo
    Vince Simonowicz
    CIO / ITS Director, City of Rock Hill, SC

    Vince Simonowicz graduated from the University of Houston in electrical engineering and is a certified CIO from the University of North Carolina School of Government and has been in the engineering and technology fields for more than 40 years. Vince has been an integral participant and leader for building complex secure enterprise based digital service applications, automations, data services, and control systems.

    With a commitment to quality, the ability to apply solutions that result in a multiplier effect while focusing on efficiency and fiscal responsibility, working for Michelin Tire Corporation for 20 years in various roles ending as their North American Strategic Projects Manager. Then moving to the City of Columbia, South Carolina as their Director of IT Operations; And for the past 13 years, now leads the Department of Information Technology Services team as their CIO/Director of Information Technology Services for the City of Rock Hill, South Carolina. In addition to leading various other organizations over the years, a number of publishing ventures & a few awards here and there; Vince was also the 2016 recipient of the Charlotte Business Journal’s CIO of the Year for Government. Vince’s standing moto is ‘Take the time to do it right the first time, focusing on the right things, at the right time and the right way; will always win.’

  • speaker photo
    Jonathan Carr
    Cybersecurity & Compliance Manager, Flow Control Group, Perception Point

    Meet Jonathan Carr, a cybersecurity and compliance manager with a passion for fortifying digital realms and collecting tangible treasures. With an extensive background in cybersecurity and compliance, Jonathan is the go-to guardian for securing data and ensuring regulatory adherence.

    Off the clock, you'll find Jonathan on the basketball court, dribbling his way through challenges, mirroring his knack for tackling complex cybersecurity issues head-on. He's not just a strategist in the office but also a strategic player on the hardwood. In addition to his love for hoops, Jonathan has a sneaker collection that rivals the best. Each pair tells a story, reflecting his appreciation for style, innovation, and craftsmanship. When not chasing cyber threats or practicing his slam dunk, Jonathan indulges in a unique hobby—collecting Funko Pops. His shelves are a colorful testament to his enthusiasm for pop culture icons and fictional characters.

    Jonathan Carr is the cybersecurity guru with a penchant for physical and digital collecting. He's equally at home guarding the digital frontier and seeking out the latest additions to his impressive collections.

  • speaker photo
    Abhinav Singh
    Head of Security Research, Normalyze

    Abhinav leads security research at Normalyze. He has previously worked for companies like AWS, Netskope, and JPMorgan. His contributions to the security community include international books, academic papers, patents, and blogs. He is an active speaker and trainer at conferences like Black Hat, DEF CON, and RSA.

  • speaker photo
    Brett Price, CISSP, CISM
    Lead Cybersecurity Consultant, vCISO, AccessIT Group

    Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Brett’s skills range from analyzing network packet behavior to securing enterprise critical infrastructure with expertise in assessing and consulting on risk management frameworks and standards such as NIST 800-53, NIST CSF, CIS and ISO/IEC 2700X. Brett has experience working with enterprise and mid-market customers across various industry sectors such as healthcare, banking, industrial, retail, pharmaceutical and insurance.

  • speaker photo
    Jimmy Phipps
    Regional VP of Sales – East, LightBeam.ai

    Data Security, Privacy, and Governance Evangelist at LightBeam.ai With more than 11 years of experience in selling cloud-based and enterprise-focused technology solutions, Jimmy has developed strong skills in new business development, customer relationship management, and strategic partnerships. He has also gained domain expertise in DPA, cloud security, and privacy automation, which are essential for addressing the growing challenges and opportunities in the data-driven economy. At LightBeam, he leads a team of high-performing sales professionals who are dedicated to delivering value and satisfaction to customers across various industries.

  • speaker photo
    James McCarthy
    SVP, Americas, Forcepoint
  • speaker photo
    Margaret Nolia White, Moderator
    Head of Cybersecurity Technology, Truist
  • speaker photo
    Tony Cook
    Sr. Director, DFIR & Threat Intelligence, GuidePoint

    Tony Cook is the Senior Director responsible for DFIR & Threat Intelligence on GuidePoint Security’s consulting team, where he manages digital forensics, threat intelligence and incident response engagements on behalf of the firm’s clients. His career background includes high-level national security activities in cybersecurity operations for several clients over various verticals.

    Tony joined the GuidePoint team from Palo Alto/The Crypsis Group where he was a DFIR Director and led the Threat Intelligence team, including Malware Analysis & Purple Team/Threat Hunting. Prior to that Tony spent several years working as a principal consultant for RSA NetWitness, a computer and network security company, where he managed teams of consultants responding to incidents, hunting advanced persistent threats, penetration testing, and helping clients harden their networks against attack. During his time at RSA, he helped several SOCs mature their threat hunting capabilities from non-existent to fully established successful hunt teams.

    Previously, he was the cyber security operations architect and incident response director at the network security operations center of the Space and Naval Warfare Systems Center (SPAWAR), which is now known as the Naval Information Warfare Systems Command. While there, he developed the SOC from a five-person monitoring team to 60 analysts running a fully certified SOC providing threat intelligence, event detection, rapid response, and root cause analysis. He was responsible for implementation, analytics, and development for a wide range of cyber security issues and activities.

    Prior to this, Tony was the Malware Analysis & Digital Forensics officer at the Naval Cyber Defense Operations Command, where he managed a team of 28 analysts in providing swift and accurate forensics/malware analysis. He served as a liaison with several defense department and intelligence agencies on collaboration efforts, and he authored a certified training course for analysts on forensic analysis and malware reversal.

    Tony has also managed forensics and incident response at the U.S. Joint Forces Command and has worked as a security engineer for Raytheon at NASA’s Langley Research Center. He began his career with the Navy, where he served as lead system administrator on the USS Enterprise. He holds a bachelor’s degree in information security from Colorado Technical University, as well as a broad range of certifications in IT security.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Chad Hicks
    CISO, MercuryGate International

    Chad is a proven InfoSec leader, with nearly 10 years' experience as a CISO. He has significant experience managing people, process, and technology to reduce risk and deliver business value. He has successfully led multinational companies through mergers and acquisitions, divestitures, and rapid security certifications.

    An experienced engineer that has touched all facets of the IT infrastructure. From the server room to the board room, he can implement effective change throughout. This hands-on experience is a key differentiator when dealing with stakeholders in infrastructure and development organizations. Being able to empathize with the teams and understand what the impact a security control will have is not something many CISOs can articulate.

    Educating end-users as well as fellow staff is a key component of an IT leader. Chad has taken this to heart, and has spent countless hours dedicated to educating up and coming engineers, as well as business leaders. He is currently an Adjunct Professor at Mitchell Community College, and previously worked at UNC-Charlotte'a Belk College of Business.

  • speaker photo
    Arron Harrell
    Sr. Solution Architect, Picus Security

    Arron Harrell is a cybersecurity engineer with 25 years' experience for various cybersecurity manufacturers. Arron has spent the last eight years of his career in the Breach and Attack space for various BAS providers. Arron is an Army Veteran that served in Operation Desert Shield/Desert Storm. He resides outside of Dallas, Texas, on an off-grid 50-acre cattle ranch. He enjoys golfing, hunting, and fishing in his free time.

  • speaker photo
    Jacob Heisey
    Solutions Engineer, Wiz
  • speaker photo
    Mark Hurter
    Solutions Architect, CyberArk
  • speaker photo
    John Newsome
    Solutions Engineer, Claroty

    John is a 30-year industry veteran in IT and cybersecurity and has worked for some of the most recognizable brands in cybersecurity such as Palo Alto Networks, Cisco Systems, Blue Coat (now Symantec), and Websense (now Forcepoint). John has been a guest speaker and panelist at numerous industry events and tradeshows and has served as a subject matter expert in advanced threat detection and remediation techniques.

  • speaker photo
    Lee Psinakis
    Cloud Security Sales Specialist, Check Point Software Technologies

    Lee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.

    Before joining Check Point, Lee held Sales, Management and Business Development positions focused on Emerging Services with technology leaders, including AT&T, HP, IBM, Equinix and NetApp. He has deep industry knowledge across WAN, IT infrastructure, data center, private, hybrid and public clouds, and first-hand experience working with hundreds of enterprise customers across the U.S.

  • speaker photo
    Joe Tomasone
    Senior Sales Engineer, Thales
  • speaker photo
    Cheri Sigmon, Moderator
    vCISO, Confidential

    Leveraging 21 years of experience in leadership, information security and workforce development, as a Chief Information Security Officer (CISO), Office of the Secretary of Defense (OSD), Cheri secured sensitive military networks/communications/technology. The Joint Staff; USSTRATCOM Joint Task Force-Global Network Operations; Headquarters Air Combat Command; US Joint Forces Command. Retired US Air Force officer, Clemson University alum, native of York, SC.

  • speaker photo
    Ben Carr
    Chief Security & Trust Officer, Halcyon

    Ben is a Security & Risk Executive and recognized thought leader with more than 25 years of results driven experience in developing and executing security strategies. Currently, Ben is the Advisory CISO for Halcyon. Halcyon has built the first anti-ransomware engine to address one of the most prevalent threats in the cyber industry today. Ben has served in global leadership roles at advanced technology, high risk, and rapid growth companies such as Ericsson (Cradlepoint), Qualys, Aristocrat, Tenable, Visa, and Nokia. Ben has served as a member of the Board of Directors for organizations such as IT-ISAC and NTXPKUA. He is an advisor for Noname Security and Syn Ventures and has previously served on Advisory Boards for Living Security, TruStar, Mimecast, Qualys, and Accuvant.

  • speaker photo
    Happy Hour
  • speaker photo
    Rick Doten
    VP, Information Security, Centene Corporation

    Rick is CISO of Carolina Complete Health, a state healthcare plan, for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industries and companies around the world. Other notable roles over last 20 years have been as a Risk Management consultant at Gartner, Chief Scientist for Lockheed Martin’s Center for Cyber Security Innovation, and Managing Principal in the Professional Security Services practice at Verizon.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes