Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, March 17, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageCyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmYour CEO just asked about AI security. Do you have a clear answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots. And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.What You’ll Master-
The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
-
Executive Translation — Turn technical AI risks into boardroom language
-
NIST AI RMF Implementation — Practical application, not theory
-
The $12M Question — Secure against deepfake fraud and AI-enabled attacks
-
Shadow AI Discovery — Find and govern the AI already in your organization
-
Business-First Security — Protect value, not just systems
Who Should AttendIdeal for:-
CISOs facing board questions about AI
-
Information Security Directors enabling digital transformation
-
IT VPs without dedicated security teams
-
Cybersecurity Consultants serving enterprise clients
-
Risk Managers governing AI initiatives
-
Aspiring decision makers and those reporting to one
Not designed for:-
Developers wanting to code AI models
-
Analysts seeking technical certifications
-
Anyone looking for hands-on hacking labs
What This Workshop Is (and Isn’t)This workshop is NOT about:-
Prompt injection techniques
-
Model architecture security
-
Technical vulnerability scanning
-
Writing 200-page policies
This workshop IS about:-
Speaking profit-and-loss to executives
-
Enabling your AI transformations
-
Building cybersecurity into AI from day one
-
Becoming the trusted AI advisor
What You’ll Leave With1. The Complete AIR-MAP Toolkit-
90-day implementation roadmap
-
Discovery templates and workflows
-
Risk scoring calculators
-
Executive presentation templates
2. Ready-to-Deploy Governance Assets-
AI Acceptable Use Policy (customize in minutes)
-
Vendor assessment questionnaires
-
Incident Response playbooks
3. A 30-Minute Strategy SessionA complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture. - Wednesday, March 18, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Reducing Risk by Embracing Secure AI SolutionsDirector, Infrastructure & Security, National GypsumRegistration Level:
VIP / Exclusive
8:00 am - 8:45 amIt seems we are all very busy with AI and the explosion of AI solutions, with increased risks coming along for the rocket ship ride! What are you and your teams doing to address the AI solutions and services that your company is engaged in?
At NGC, we are “embracing AI” and have been for some time. Let’s have a peer-to-peer discussion and walk through:
- What are you and your teams doing to make this a safe and less risky path for everyone? Please share any clear steps or processes that you are following.
- What successes have you had?
- What are your biggest challenges?
Let’s all learn from one another regarding safe and secure AI adoption.
8:00 amLake Norman & Charlotte IT Professionals Chapter MeetingThe Human Layer: AI, Cyber Risk, and Workforce EvolutionProgram Director, Human-Centered AI, The University of North Carolina at CharlotteCISO & Infrastructure Services, CavaCISO, Discovery EducationCIO/CISO, Elevate TextilesChief Security Officer, GartnerSr. Manager, Digital Employee Experience, Under ArmourRegistration Level:
Open Sessions
8:00 am - 8:45 amThis panel explores the critical intersection of artificial intelligence, cybersecurity risk, and the evolving workforce through a compelling cake-layer metaphor.Modern organizations, like a layered cake, are built from foundational cyber infrastructure at the base, an accelerating AI layer in the middle, and the workforce at the top. Success depends on how well these layers align. As AI rapidly transforms business operations, it simultaneously reshapes the threat landscape and redefines the role of the modern workforce. While organizations invest heavily in advanced technologies, the human layer remains both the greatest vulnerability and the strongest line of defense—the essential binding ingredient that turns technology investment into resilience, trust, and sustainable growth.Join industry experts for a forward-looking discussion on balancing innovation, resilience, and responsibility in the age of AI.8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The Future of IP in a Digital World: Redefining IP Risk & Opportunity in the Age of AI & CyberFocus Areas: AI Model Security; Intellectual Property; Cyber-Resilient Innovation & Governance; Algorithmic Theft; Data Poisoning DefenseCybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIntellectual property is no longer just a legal asset, it is a dynamic, digital target. In an era defined by artificial intelligence, autonomous systems, and persistent cyber threats, the traditional boundaries of IP protection are dissolving. Today’s adversaries don’t just steal information; they extract models, replicate innovation at scale, manipulate training data, and weaponize digital access to undermine competitive advantage.
This keynote explores how AI and cyber capabilities are fundamentally reshaping intellectual property risk. From model inversion and prompt injection to algorithmic theft and data poisoning, the threat landscape is evolving faster than most organizations can measure it. At the same time, AI presents unprecedented opportunity, accelerating innovation, enhancing detection, and redefining how IP is created, protected, and monetized.
Attendees will gain a forward-looking framework for understanding modern IP exposure, governance blind spots, and the strategic decisions leaders must make to protect competitive advantage in a world where digital replication is instant and global. The future of IP will not be defended solely in courtrooms, it will be secured through architecture, policy, and proactive cyber resilience.
9:45 amNetworking Break & Cyber ConnectContinue the Conversation with Opening Keynote Speaker Dr. ColeCybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallWant to know more about why Dr. Eric Cole thinks the old CISO model is broken? Or how to be a better manager, leader, or team player? Or do you just want to chat more with the good doctor after his motivating keynote? Either way, come join this bonus session in the Networking Lounge immediately after his opening keynote.10:15 am[Panel] Who Are You? A Quick Look at Identity with Regard to CybersecurityFocus Areas: Identity & Access Management (IAM); Authentication and Authorization; Zero TrustChief of Staff, Cyber and Third-Party Tech Risk Team, AT&TIdentity & Access Management, AT&TIdentity and Access Management – Risks, Issues, Controls and Governance, AT&TRegistration Level:
Conference Pass
10:15 am - 10:50 amDuring this session, we will dig into how and why access is controlled, what is the difference between authentication and authorization, is MFA and 2FA the same thing, what is RBAC, and why some people and organizations call Identity Management the “first line of defense in cybersecurity.”10:15 am[Panel] Bridging the Gap: The Role of the BISO in Modern CybersecurityFocus Areas: Business Information Security Officer (BISO); Executive Alignment; Security Career PathsSr. Director, BISO, Compass GroupBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Registration Level:
Conference Pass
10:15 am - 10:50 amAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.10:15 amData Security: The Missing ContextFocus Areas: Contextual Data Readiness & ROA; Gen AI: Securing the "Force Multiplier"; Maximizing Existing Security ROIDirector, Engineering, Concentric AIRegistration Level:
Open Sessions
10:15 am - 10:50 amData security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.
Attend this session to learn:
- Why traditional approaches to data security have failed
- How AI and context are revolutionizing data security
- Where to maximize the value of your existing security investments
- What you can do to secure your Gen AI rollouts
With the right strategy and technology, you can transform your data from a liability to a well-managed asset.
10:15 am[Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral AnalyticsFocus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access GovernanceSolutions Engineer, NetwrixDirector, Enterprise Sales Engineering - Great Lakes, Arctic WolfDirector of Engineering, Ping IdentityHead of Technology Risk, AcrisureRegistration Level:10:15 am - 10:50 amThe human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.
Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.
10:50 amNetworking Break & Cyber ConnectTop 10 Most-Needed AI Skills in Cybersecurity – "Draft Day" to Accelerate Your CareerLead Information Security Analyst, TIAARegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallThis bonus session in the Networking Hall will name the top 10 AI skills needed in cybersecurity now and explain why they are in such high demand. This ranking has been compiled based on Charles Hartley’s external and internal research as a senior content specialist for TIAA’s Cybersecurity Awareness Team. This will be a unique presentation in the style of the NFL’s Draft Day. Commissioner Hartley, “with the next pick in the AI career draft….”
11:10 amThe Human Side of CybersecurityFocus Areas: Security Culture; Security Awareness Training; Social EngineeringSr. Information Security Analyst, LPL FinancialRegistration Level:
Conference Pass
11:10 am - 11:45 amThis session focuses on the human side of cybersecurity. It’s important because with today’s evolving threats, technology controls won’t always protect your business. Increasingly sophisticated attacks often rely on human error for success, rather than just technical flaws or vulnerabilities. Humans are the first line of defense, and by building a stronger security culture, your business can better identify social engineering tactics to reduce risk and have a staff that is more security conscious.
11:10 amFrom Identity Controls to Business Impact: Making IAM Work for LeadersFocus Areas: IAM Strategy & Business Alignment; Risk & Cost Optimization; Executive Communication & GRCVP, Information Security, PathwardRegistration Level:
Conference Pass
11:10 am - 11:45 amIdentity and Access Management is no longer just a technical control—it’s a business enabler. This session helps security and business leaders rethink IAM through the lens of outcomes, not tools. Using real-world examples from regulated environments, attendees will learn how to prioritize IAM initiatives that reduce risk, lower cost, and improve workforce experience. The talk focuses on practical decision-making, balancing security, usability, and feasibility, and avoiding common pitfalls that stall IAM programs. Attendees will walk away with a clear framework for aligning IAM investments to business priorities and communicating value to executive stakeholders.11:10 amKill the Attack Chain: Stop Ransomware Before It StartsFocus Areas: Ransomware Defense & Resilience; Zero Trust & Microsegmentation; Cyber Kill Chain StrategyDirector, Security Strategy & Technology, AkamaiRegistration Level:
Open Sessions
11:10 am - 11:45 amRansomware continues to escalate despite increased security investments because the encryption is only one step in a broader attack chain. By focusing on the full kill chain, security teams gain more opportunities to stop attackers before widespread damage occurs.
Learn how micro segmentation can disrupt adversarial techniques before and after ransomware deployment. Discover how shifting your strategy to the entire attack chain can reduce risk, limit impact, and accelerate recovery. Learn how to:
- Disrupt the kill chain before ransomware is deployed
- Use AI to map complex environments and accelerate policy enforcement
- Leverage segmentation to enable rapid remediation without disrupting operations
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskCybersecurity Consulting Manager, AccessIT GroupCISO, SecurityScorecardSecurity Specialist, InfobloxSr. Solutions Engineer, Enterprise, SpyCloudCISO, AnMed HealthRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] Governance at the Edge: Balancing GenAI Innovation with Enterprise ControlFocus Areas: Shadow AI; Data Exfiltration Risk; AI Readiness & Financial Performance (ROA); Browser-Based Identity & Policy EnforcementDirector, Solution Engineering, IslandRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterEveryone is using GenAI apps, and most are accessed via the browser. Are you able to see it, understand it, and adopt it safely?
This keynote session addresses the No. 1 concern among corporate leaders: realizing the benefits of GenAI adoption while retaining the data controls, policy enforcement, and compliance that enterprises need.
Matt Pour will cover:
- The risks associated with Shadow AI and lack of visibility
- How data leaks into unapproved AI apps, including employees uploading/copying/pasting sensitive data into unmanaged AI tools
- How you can gain visibility in AI activity and design policies that safely enables AI usage
- Other tips for managing employee use of AI within corporate boundaries
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Achieving True Resilience in the AI EraCISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmIn the cybersecurity arena, AI technology presents new possibilities for both defenders and attackers. The key to withstanding the next evolution of cyber threats? A resilient identity infrastructure.Whether your organization uses a specific vendor tool or runs a mix of systems and solutions, identity is your digital foundation of trust. If identity is compromised, your organization’s ability to operate is at risk.Join this closed-door, invitation-only, peer-to-peer discussion to learn insights and practical strategies for building your identity, cyber, and business resilience. This open forum exchange explores:
-
What does it take to plan for true cyber resilience?
- What happens when your identity infrastructure is under attack?
-
How do you manage the complexities of a hybrid identity environment?
-
How can security, identity, IT, and business leaders work together to ensure resilience across the entire cyber lifecycle?
12:45 pmNetworking Break & Cyber ConnectCyber on the Grid: NERC CIP Audits & EnforcementManager, CIP Monitoring, SERC Reliability CorporationLegal Counsel, SERC Reliability CorporationRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThis discussion delves into NERC CIP standards, detailing their history, governance, and structure to enhance cybersecurity for the Bulk Electric System (BES). Attendees will explore how these standards align with risk-based audits, addressing asset identification, secure access controls, and incident response. Key insights include the standards’ modular framework, governance by FERC and regional entities, and their evolution to safeguard North America’s power grid. The session highlights risk-based monitoring to ensure compliance and effective threat mitigation, offering actionable guidance for professionals navigating NERC CIP in a dynamic regulatory environment.
This discussion will also address what happens when a registered entity is deemed to be noncompliant with a standard and what that enforcement process looks like, including how findings are documented, how mitigation plans are developed and tracked, and how enforcement outcomes are determined.
1:15 pmBEC Bang! A Business Email Compromise Table-Top ExerciseFocus Areas: Business Email Compromise (BEC); Incideent Response; Tabletop ExcercisePrincipal Investigator & CEO, Rexxfield / Dougherty Intelligence & InvestigationsRegistration Level:
Conference Pass
1:15 pm - 1:50 pmIn this interactive, table-top exercise session, the audience is divided into 2 or 3 separate groups and designated as companies or entities doing business together. A BEC incident is introduced, and the group is asked to tabletop how to remedy the BEC incident from different perspectives of financial victims, compromise victims, and affected third parties. A gamification of the participation will show which group would have the better chance at a proper recovery based on prior investigations and incidents.
1:15 pmTechnology Rationalization in the Age of AI: A Strategic Approach to Cyber ResilienceFocus Areas: Rationalization & Financial Performance; Complexity Risk & the "AI Friction Tax"; Engineered Resilience for Autonomous SystemsStrategy and Transformation Leader, AccessIT GroupRegistration Level:
Open Sessions
1:15 pm - 1:50 pmTechnology rationalization has been a standing objective for many security leaders, yet it has consistently been deprioritized in favor of more immediate initiatives. Historically, the cost of deferral was tolerable. That is no longer the case.
Modern security environments are increasingly fragmented—characterized by excessive vendor sprawl, overlapping capabilities, redundant tooling, and limited end-to-end visibility. This complexity not only inflates cost but also undermines operational effectiveness and governance. As AI becomes embedded across security operations, software development lifecycles, business workflows, and autonomous systems, the risks associated with an unrationalized environment accelerate significantly.
This session outlines why rationalization must move from operational backlog to strategic agenda. Participants will examine a structured approach to evaluating their current technology stack, identifying underperforming or duplicative investments, aligning capabilities to measurable business risk, and establishing a foundation that can be governed effectively in an AI-enabled enterprise.
Designed for CISOs, security leaders, and technology executives, this session provides both the strategic framing and practical considerations required to drive meaningful rationalization at the enterprise level.
1:15 pmInterdependency: The Emerging Operational Security Dependencies Between Data Centers and Electric UtilitiesFocus Areas: Critical Infrastructure; Operational Technology (OT); Supply Chain Risk ManagementSenior Security & Regulatory Affairs Advisor, SERC Reliability CorporationRegistration Level:
Conference Pass
1:15 pm - 1:50 pmThe critical role of data centers in sustaining global economic health and societal function has been widely acknowledged and scrutinized. Increasingly recognized as critical infrastructure, data centers operate around the clock to provide essential services. As digital infrastructure continues to advance, data centers are entering a new era shaped by artificial intelligence (AI) and high-performance computing. These facilities require uninterrupted, stable electricity from their serving utilities to maintain operational efficiency. This dependency creates a reciprocal relationship in which the reliability and security of the utility directly impact the reliability and security of the data center, and vice versa.
1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceVP of Strategic Accounts, SeceonDirector of Application Security, Security JourneyCISO & Privacy Officer, Western Carolina UniversityRegistration Level:
Open Sessions
1:15 pm - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectAsk Me Anything! A Live Conversation with Security LeaderCISO, NovolexRegistration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallSession details to come.
2:10 pmCreating a Resilient Compliance Culture with CMMCFocus Areas: CMMC (Cybersecurity Maturity Model Certification); Compliance and Regulatory Affairs; Security CultureDirector, Cybersecurity and Governance, SteelFab, Inc.Registration Level:
Conference Pass
2:10 pm - 2:45 pmWith the final CMMC rule now published and enforcement set to begin for new U.S. Department of War contracts, companies across the supply chain are facing a major shift in how compliance, cybersecurity, and business success intersect. In this session, we’ll explore how companies can achieve CMMC compliance; not just to meet regulations, but to build a stronger, more resilient security culture.We’ll walk through practical steps to roll out new requirements to your employees and embed security and compliance into day-to-day business operations. Whether your business is already working with defense contracts or simply wants a more robust approach to compliance and security, you’ll leave with actionable ideas you can apply now.2:10 pmYour Internal AI: Empowering Innovation While Reducing Inadvertent Insider ThreatsFocus Areas: AI Security & Governance; Insider Risk Management; Data Privacy & ComplianceSr. Director, Cyber Security, Acumatica, Inc.Registration Level:
Conference Pass
2:10 pm - 2:45 pmThe explosive adoption of generative AI and large language models (LLMs) has transformed how organizations work, enabling employees at all levels to accelerate tasks, generate insights, and drive innovation. Yet this democratization of AI potentially introduces a significant and often overlooked risk: inadvertent insider threats.This presentation examines how the convenience of “unsubscribed” mainstream AI tools has dramatically increased the attack surface for data exfiltration through non-malicious insider actions. We will explore real-world consequences, regulatory implications, and the growing awareness gap that leaves even sophisticated organizations vulnerable.The core message is one of empowerment rather than restriction: organizations can and should provide their teams with the full power of state-of-the-art LLMs without compromising security. “Your Internal AI” introduces a secure, enterprise-ready alternative that enables seamless use of mainstream models while automatically safeguarding sensitive information.Through intelligent pre-processing, redaction, anonymization, and policy enforcement, sensitive data is protected before it ever leaves the organization’s control, ensuring compliance and preserving privacy.Attendees will see this solution in action through a live demonstration, illustrating how users can interact naturally with powerful LLMs in everyday business related activities, while the system transparently secures confidential content in real-time.By the end of the session, participants will understand not only the risks posed by unchecked AI usage but also how to deploy “Your Internal AI” as a strategic enabler: delivering the productivity gains of cutting-edge AI to every employee, securely and responsibly.2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityProduct Marketing Manager, Harmonic SecuritySecurity Specialist, Splunk, a Cisco CompanyGlobal Head of IT Infrastructure & Cybersecurity, Owens Corning Glass ReinforcementsRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:10 pmAI Infrastructure as Strategic Enterprise Infrastructure: Sovereignty, Security, and Resilience with Heterogeneous HPCFocus Areas: AI Infrastructur; Sovereign Resilience; HPC Security & Hardware-Level Trust; Strategic AI Governance (ROI)SVP | Network Security & DLP Engineering, TruistCEO, I/ONXvCISO, Cyber CenturionGlobal CISO, Kontoor BrandsSr. Security Engineering Manager - AI Security, Lowe's Companies, Inc.VP IT & Global CISO, Hanesbrands Inc.Registration Level:
Conference Pass
2:10 pm - 2:45 pmFor decades, data centers were viewed as back-office-utilities important, but largely operational. That paradigm has changed. Today, AI compute infrastructure sits at the heart of enterprise competitiveness, national economic security, and regulatory scrutiny. AI models are only as powerful as the infrastructure that trains and runs them and that infrastructure is now being treated as critical.
As geopolitical tensions reshape supply chains, and as data sovereignty and AI governance regulations accelerate globally, CIOs and CISOs are being asked to ensure that AI environments are not only high-performing, but secure, resilient, and sovereign-ready.
We’ll explore how organizations are building hardware-level trust, reducing supply chain risk, designing performance and security to reinforce each other, and ensuring workload portability across heterogeneous environments including emerging models like those enabled by I/ONX High Performance Compute.
The central question for today: “In an era of AI-driven disruption, what does strategic resilience really look like for enterprise AI infrastructure?”
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] The Changing Dynamics of the Role of a CISO in the Age of AIFocus Areas: CISO Strategy; AI Governance and Ethics; Proactive Risk ManagementVP & Global CISO, HanesBrands Inc.Registration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterAs the role of CISO continues to evolve, several key trends are shaping the future responsibilities of individuals in this position and their teams:
1. There is a noticeable trend towards increased scrutiny on the decision-making processes of CISOs. Stakeholders are placing a greater emphasis on understanding and evaluating the rationale behind cybersecurity strategies and actions.
2. Ethical considerations in handling data breaches are becoming a focal point for CISOs. It is essential for CISOs to not only address breaches effectively but also to do so in an ethical manner that prioritizes the protection of individuals’ data and privacy.
3. The landscape of regulations governing CISO roles may be shifting towards more stringent requirements. CISOs may need to navigate a complex web of compliance standards and regulations to ensure the organization’s cybersecurity practices align with legal expectations.
4. Proactive cybersecurity measures are gaining importance within organizations. CISOs are expected to anticipate and mitigate potential threats before they materialize, rather than solely reacting to incidents after they occur.
5. Building a culture of transparency and accountability within CISO teams is emerging as a critical focus area. CISOs are tasked with fostering an environment where team members feel empowered to raise concerns, share information, and take ownership of cybersecurity initiatives.
Hear how CISOs and their teams can navigate the new age of cybersecurity, one that is continually evolving.3:45 pmHappy Hour & Dash for PrizesSponsored by AccessIT GroupRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
Generously sponsored by:

- AccessIT GroupBooth: 300
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- Akamai TechnologiesBooth: 315
Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. With the most distributed compute platform—cloud to edge—customers can build modern apps while keeping experiences closer to users and threats farther away. Learn about Akamai’s security, compute, and delivery solutions at akamai.com.
- AnzennaBooth: TBD
Anzenna provides advanced security solutions that streamline the investigation of identity threats by integrating multiple security tools and reducing the need for extensive manual operations.
- Arctic Wolf NetworksBooth: 240
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AxoniusBooth: 300
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.
- Black DuckBooth: 135
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
- Canary TrapBooth: 220
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- CentripetalBooth: 400
Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.
- ChainguardBooth: 155
Chainguard Images provide the building blocks for a secure software supply chain. Leverage container images that have cryptographic signatures, SBOMs, SLSA provenance, and more to help meet compliance and prevent supply chain attacks.
- Charlotte IT ProfessionalsBooth: TBD
We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.
- Charlotte Metro ISC2Booth: TBD
The Charlotte Metro ISC2 chapter is a 501c3 non-profit organization, whose mission is to advance information security in the local communities throughout the Charlotte Metro area. We provide our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate. We are committed to engaging in public service activities and outreach to advance cybersecurity awareness in the broader community.
- Charlotte Metro ISSABooth: TBD
The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.
- Check Point Software TechnologiesBooth: 300
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- Clarity SecurityBooth: 225
Clarity Security makes identity governance autonomous, intelligent, and effortless. Powered by attribute-based access control, we automate user access reviews and every aspect of identity lifecycle management—saving time, cutting cost, reducing risk, and turning IT into a business enabler.
- ClarotyBooth: 400
Claroty empowers organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, threat detection, and secure remote access. Backed by the world’s largest investment firms and industrial automation vendors, Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America.
- Cloud Security Alliance Charlotte ChapterBooth: TBD
CSA chapter membership allows opportunities for continued learning, security awareness, networking, and career growth.
- Network with peers and subject matter experts
- Gain valuable insight from industry professionals and peers
- Build cloud security awareness at the community level
- Participate in cloud security education and training locally
- Participate in CSA research and development
- Discuss cloud vulnerabilities and brainstorm solutions
- Be a leader in the cloud security field
- Member discounts on training and exams
- CofenseBooth: 223
Cofense® is the original and leading provider of security awareness training and email phishing simulation, offering global enterprise-level advanced email threat detection and remediation solutions. Cofense PhishMe® and Cofense Phishing Detection and Response (PDR) offer the world’s only platforms to leverage over 35 million Cofense-trained employees who actively report suspected phishing and other dangerous email threats in real-time. Exclusive only to Cofense, this reporting system ingests and catalogs thousands of threats per day that are missed by current email gateway technologies and then eradicates those threats from customer inboxes. In short, Cofense sees and stops threats other email security systems miss. Please visit www.cofense.com or connect with us on X and LinkedIn for additional information.
- Concentric AIBooth: 325
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- CorelightBooth: 300
Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com
- DarktraceBooth: TBD
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.
- DelineaBooth: 205
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
- ExabeamBooth: 150
Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution. With consistent leadership in AI innovation and a proven track record in security information and event management (SIEM) and user behavior analytics, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline operations. Learn more at www.exabeam.com.
- ExpelBooth: 300
Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.
- Global Private Cloud Network (GPCN)Booth: 400
The Global Private Cloud Network (GPCN) provides private cloud compute across the world in Tier 3 data centers on a pay-per-use basis.
- Halcyon, IncBooth: TBD
Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. Halcyon’s core platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes. To learn more and get a demo, contact us today.
- Harmonic SecurityBooth: 430
Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.
Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.
- ISACA CharlotteBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
- InfobloxBooth: 230
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.
- I/ONXBooth: 400
IONX is pioneering a new global standard that benefits all governments and enterprises with AI compute. I/ONX’s platform is the world’s first future ready, mixed processor compute solution that guarantees data sovereignty, derisks supply chain availability, eliminates vendor lock, improves efficiency, and enables scalability.
- IslandBooth: 320
What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.
- Knightz GroupBooth: 400
Knightz Group is a boutique cybersecurity firm, blending enterprise-level expertise with nimble, client-first execution. We provide and manage compliance driven, operationally focused solutions for complex environments.
- Lake Norman IT ProfessionalsBooth: TBD
Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!
- LightbeamBooth: 210
LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.
- LogicallyBooth: 120
Logically is a leading national managed security and IT solution provider that helps organizations secure and support their businesses today, solve for tomorrow, and strategize for the future with cyber-first solutions. Our team of experts, including cybersecurity, engineering, networking, and cloud specialists, collaborate with customers to implement solutions that protect their assets, reduce risk, and optimize performance, end to end. Since 1999, we have made long-term relationships, customer service excellence, and purposeful innovation guiding principles to ensure customers have a trusted advisor at their side, helping them focus on their business, not the technology behind it.
- NetskopeBooth: 300
Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.
- NetwrixBooth: 450
Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact.
More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure. - Nudge SecurityBooth: 215
Nudge Security is a SaaS security company offering a platform to manage and secure an organization’s SaaS applications. The platform provides visibility and governance over SaaS and cloud assets, including shadow IT, and quickly discovers SaaS accounts via read-only API access. It also delivers vendor security profiles, compliance attestations, and alerts for SaaS supply chain breaches.
- OptivBooth: 500
Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.
- Ovalix, Inc.Booth: 110
Ovalix empowers organizations to confidently embrace AI technology by mitigating associated risks such as data leakage, malicious prompts, shadow AI, and regulatory non-compliance across AI applications ranging from basic LLMs to sophisticated AI Agents. By ensuring robust security, maintaining regulatory integrity, and preventing data breaches, Ovalix enables organizations to unlock the transformative power of AI with peace of mind.
- Phish ClubBooth: TBD
Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.
Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!
- Ping IdentityBooth: 440
Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.
- Qualys, Inc.Booth: TBD
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- SaviyntBooth: 133
Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience.
- Seceon Inc.Booth: 242
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.
What Sets Seceon Apart:
- Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
- AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
- Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
- Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.
Why Organizations Choose Seceon:- Cut cybersecurity costs by 60% by replacing siloed tools
- Stop threats faster with AI-powered detection and automated response.
- Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.
Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- SecPod Technologies, Inc.Booth: 145
SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
• Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
• Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.
- SecurityScorecardBooth: 300
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.
- Security JourneyBooth: 420
Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely–it turns everyone in the SDLC into security champions.
Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications.
- SemperisBooth: 330
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- SIM CharlotteBooth: TBD
The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:
- Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
- Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
- Challenging our comfort levels by exchanging ideas with peers and business counterparts.
- Being a resource for each other, and personal networking.
- SnykBooth: 245
Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.
- Splunk, a Cisco CompanyBooth: 335
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- SpyCloudBooth: 435
SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts worldwide. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. Learn more & check your exposure at spycloud.com.
- STIGroupBooth: 400
STIG is a national leader in Cybersecurity and Managed IT Solutions, engineered to protect even the largest operations. Our strategic depth of expertise ensures that businesses, from emerging enterprises to major corporations, receive the same unyielding protection.
- Sublime SecurityBooth: 115
Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
- Sumo LogicBooth: 200
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- Structured + Juniper NetworksBooth: 130
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure and managed services. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology. Customers trust us to provide valuable insight throughout the process of selecting and implementing secure and scalable IT strategies, platforms, and processes that meet modern expectations and drive measurable improvements throughout the enterprise.
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world needs network innovation to connect ideas and unleash our full potential. Juniper is taking a new approach to the network—one that is intelligent, agile, secure and open to any vendor and any network environment. Learn more here.
- TenableBooth: 500
Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
- Tevora + SwimlaneBooth: 105
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information, visit https://www.tevora.com.com.
At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit from the world’s first and only AI automation platform for every security function. Only Swimlane gives you the scale and flexibility to unify security teams, tools and telemetry, ensuring today’s SecOps are always a step ahead of tomorrow’s threats. For more information, visit https://swimlane.com.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- TorqBooth: 455
Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.
- Trinity CyberBooth: 100
Trinity Cyber is an international cybersecurity firm that invents and operates innovative solutions to the most difficult cybersecurity challenges. The company’s products and services replace multiple market segments in the traditional cybersecurity market, with customers in over a dozen of the largest market verticals. The company’s founders, management team, and technologists are all award-winning, recognized leaders in their field—and their tech has revolutionized network security.
- Veeam SoftwareBooth: 332
Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.
With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.
- WiCyS North Carolina AffiliateBooth: TBD
- Zafran SecurityBooth: 140
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
- Zero NetworksBooth: 125
Zero Networks fixes the root cause of most successful cyberattacks—overly open networks and excessive logon permissions—with a simple, fully automated platform for zero trust segmentation and remote access. Zero Networks learns and automatically restricts network and user access to what’s strictly essential, leveraging multi-factor authentication to stop attacks from spreading.
- Abnormal AIBooth: 400
Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability.
You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection is available for Slack, Workday, ServiceNow, Zoom, and multiple other cloud applications. Abnormal is currently trusted by more than 3,200 organizations, including over 20% of the Fortune 500, as it continues to redefine how cybersecurity works in the age of AI.
Ahanu Boyle, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Mike Brannon, ModeratorDirector, Infrastructure & Security, National GypsumMike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."
Justin CaryProgram Director, Human-Centered AI, The University of North Carolina at CharlotteJustin Cary is Program Director for the Human-Centered AI concentration in the Office of Interdisciplinary Studies at UNC Charlotte, where he leads initiatives that combine humanities-based durable skills with foundational AI frameworks, ethics, and real-world application. He is also a Senior Lecturer in Writing, Rhetoric and Digital Studies (WRDS) and an AI Faculty Fellow with the Center for Teaching and Learning, contributing to campus-wide efforts, including the AI Accelerator team and other AI-focused teaching initiatives. His work centers on advancing responsible AI literacy, integrating ethical and critical AI practices into writing education, and preparing students to lead and solve complex problems in an AI-accelerated world.
Eli EdelkindCISO & Infrastructure Services, CavaEli Edelkind is a seasoned technology and cybersecurity leader with more than 20 years of experience building high-performing teams, delivering resilient technology solutions, mitigating risk, and ensuring dependable operations. He currently serves as Chief Information Security Officer and leader for Infrastructure & Technology Operations at CAVA. In this role, he leads efforts to protect the CAVA brand from cyber threats, strengthen and scale restaurant technology infrastructure, and run day-to-day technology operations—helping the company stay focused on its mission of bringing heart, health, and humanity to food.
Before joining CAVA, Eli spent nine years in cybersecurity roles across multiple organizations, including Lowe’s, where he held positions of increasing responsibility. He also served 12 years in the U.S. Marine Corps in active and reserve capacities, gaining extensive experience in leadership and national security.
Eli’s education includes a Bachelor of Science in Information Technology and National Security Affairs from the U.S. Naval Academy, an MBA from Keller School of Management, and a certificate in Space Systems Operations from the Naval Postgraduate School. He contributes to the broader security community as a member of the Retail & Hospitality ISAC Board of Directors and has been recognized by peers with the RH-ISAC CISO of the Year award in two consecutive years. He also serves on multiple advisory boards, providing strategic guidance in his areas of expertise.
Kara SchlageterCISO, Discovery EducationKara is a cybersecurity executive with 20+ years of experience leading security, risk, and operations in large, highly regulated financial institutions. She’s built and scaled global teams, managed $100M+ portfolios, and led complex IAM and GRC programs that reduced risk and strengthened regulatory posture. Recently stepping into the role of CISO at Discovery Education, Kara is known for translating complex cyber challenges into practical business decisions and leading security through a human lens. Her team leadership style builds trust, strengthens culture, and helps organizations move forward securely.
Rick ScotCIO/CISO, Elevate TextilesRick Scot is a seasoned Information Technology leader with over 30 years of experience. He currently serves as the Global Chief Information Officer and Global Chief Information Security Officer at Elevate Textiles, following senior roles at Bank of New York and Bank of America. Throughout his career, he has led strategic security initiatives, managed international teams, collaborated with law enforcement agencies, and played a key role in global cyber exercises. He also managed 4 major data transformations that created more control and safer data practices. Rick holds 33 patents in machine learning and blockchain, contributes to academic and industry advisory boards, including UNC Charlotte and NYU, and continues to drive innovation and resilience.
Kimberly TrapaniChief Security Officer, Gartner
Marcus Britt, ModeratorSr. Manager, Digital Employee Experience, Under ArmourMarcus is a strategic leader with over a decade of experience driving digital transformation and operational excellence across HR, Legal, and IT organizations. Passionate about creating inclusive environments and leveraging technology to improve business outcomes, he blends innovation with a people-first mindset. Beyond the office, Marcus is involved in mentoring youth in STEM and entrepreneurship to expand access for underrepresented communities.Marcus is a strategic leader with over a decade of experience driving digital transformation and operational excellence across HR, Legal, and IT organizations. Passionate about creating inclusive environments and leveraging technology to improve business outcomes, he blends innovation with a people-first mindset. Beyond the office, Marcus is involved in mentoring youth in STEM and entrepreneurship to expand access for underrepresented communities.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Nia F. LuckeyChief of Staff, Cyber and Third-Party Tech Risk Team, AT&TNia Luckey is a cybersecurity executive, author, and TEDx speaker focused on helping organizations rethink how trust actually works in security. With years of experience across military service, enterprise security, and executive advisory, she works with CIOs, CISOs, and boards to turn risk conversations into practical, defensible decisions. Nia’s work emphasizes the human side of cybersecurity, where leadership, culture, and accountability matter just as much as tools and controls. At SecureWorld, she brings real-world insight, candor, and a focus on what actually works.
Rashmi PalamadaiIdentity & Access Management, AT&TRashmi Palamadai has led strategic initiatives to strengthen security and compliance within Identity & Access Management. She is committed to advancing the organization’s security posture by driving continuous improvements in identity lifecycle management, access controls, data oversight, third-party risk management, and compliance validation—helping ensure resilience against evolving cyber threats. With deep expertise in IAM governance, Rashmi partners with cross-functional teams to implement secure solutions and ensure alignment with identity and access policies.
Rob Dalzell, ModeratorIdentity and Access Management – Risks, Issues, Controls and Governance, AT&TRob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte, and enjoys connecting with others that work in Cybersecurity. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. He is an ardent believer in life-long learning. In his spare time, he can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house, and trying to keep a British sports car running.
George DouglasSr. Director, BISO, Compass GroupExperienced Senior Director with a proven track record in the Security and Artificial Intelligence domains, particularly within the Group Purchasing Organization (GPO) space. Brings expertise in strategic planning, AI-driven analytics, cybersecurity frameworks, team leadership, and operational excellence.
Elvis Moreland, ModeratorBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.
Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.
Jim RobertsonDirector, Engineering, Concentric AIJim has more than 10 years of experience in the data security space and has been an Sales Engineer at Varonis, StealthBits (Netwrix), Splunk, IBM, and Bionic AI. Before that, he served in network and systems engineering roles at MSPs in the upper Midwest. His broad experience in deploying and securing systems and data has translated into thought leadership about the practical challenges in the data security posture management space.

Ken SmithDirector, Enterprise Sales Engineering - Great Lakes, Arctic WolfKen Smith is the Director of Sales Engineering – Enterprise (Great Lakes) at Arctic Wolf, with 15 years of experience spanning offensive security, sales engineering, and education. A former SIGINT operator with 5th Special Forces Group (Airborne), Ken went on to serve as a red team consultant and team lead in multiple roles. He also spent a decade developing and delivering university coursework in network and application security. Ken has presented at Thotcon, Hack Space Con, and other regional conferences, and currently serves on the Board of Directors for BSidesCLE.
Scott ThobeDirector of Engineering, Ping IdentityScott Thobe is an accomplished technical leader who excels in bridging the gap between complex technologies and tangible outcomes. He specializes in translating technical insights into actionable strategies that resonate with diverse audiences. His expertise lies in building high-performance teams and leading organizational process improvements across regions to achieve business goals.
Scott leads the Global Sales Engineering Hub and Partner Sales Engineering teams in the Americas at Ping Identity. He enjoys working with customers, partners, and cross-functional teams to balance business needs with technology, ensuring the best outcomes for customers. Additionally, he collaborates closely to shape the direction of the alliances and channel program in support of annual growth objectives.
His mission is to empower his team and customers with best-in-class IT security capabilities to protect critical enterprise and customer information. He is committed to driving business value through initiatives such as cloud transformation and cybersecurity best practices.
Jack Freund, PhD, ModeratorHead of Technology Risk, Acrisure
Charles HartleyLead Information Security Analyst, TIAACharles Hartley is a lead information security analyst with TIAA. His focus is on researching and creating compelling AI/cybersecurity content. He has a master's degree in business administration and journalism, and he has 30-plus years in the high-tech industry.
Michael TerrySr. Information Security Analyst, LPL FinancialMike Terry is a member of LPL’ Advisor and Investor Cybersecurity Team who has been with LPL for 10+ years. In his current role, Mike educates advisors and their investors about cybersecurity; offering them with best practices to stay safe, protect sensitive information, and avoid cyber-threats. Before transitioning to this role, he supported advisors with a number of different initiates. Prior to working at LPL, Mike worked in the financial services industry with companies like Capital One and Wells Fargo. Outside of work, he enjoys spending time with his family
Tracey HughesVP, Information Security, PathwardTracey Hughes is a Vice President of Information Security specializing in Identity and Access Management and Security Governance, Risk and Compliance. With over 26 years of experience, she has led enterprise IAM programs across financial services, consulting, and global technology organizations, including IBM, Deloitte, and Kudelski Security. Tracey focuses on aligning identity strategy to business outcomes, regulatory requirements, and operational reality. She holds an MBA, a master’s degree in computer science, and multiple certifications including CISSP, CCISO, CISM, PCI ISA, and PMP. Known for her practical, business-focused approach, Tracey brings real-world insight to identity leadership challenges.
Sean FlynnDirector, Security Strategy & Technology, AkamaiSean Flynn is Director of Security Strategy and Technology for Akamai Technologies. Currently he works with companies to ensure Akamai’s Security Vision aligns with and fits industry and customer needs. He also acts as a trainer for web and enterprise security for internal groups. Sean has over 16 years of IT security experience working for networking and application security vendors. Sean joined Akamai in 2012, implementing Akamai security solutions for companies. He was hands-on, helping protect customers from active attacks by state-sponsored actors, hacktivists, and cyber criminals. He has consulted some of the largest customers in Finance, Commerce, and Healthcare on Akamai solutions, implementing application, network, and enterprise security, and security best practices.
Brandon BrevardCybersecurity Consulting Manager, AccessIT GroupA seasoned cybersecurity leader who helps organizations create and protect value through a unique perspective on cyber strategy, program development, and security technologies. With experience spanning both Risk Management and Information Technology roles, Brandon combines governance and policy expertise with deep technical knowledge across environments ranging from Fortune 500 companies to the U.S. Department of Defense. He builds and strengthens trust at all levels, from SOC analysts to executive leadership.
Steve CobbCISO, SecurityScorecardAffectionately known in the industry as Cyber Santa, Steve Cobb brings more than 30 years of leadership and consulting involving IT infrastructure, cybersecurity, incident response, and cyber threat intelligence. Prior to becoming the CISO for SecurityScorecard, Steve led Cybersecurity and IT Infrastructure teams at organizations like One Source, Verizon, Microsoft, RBC, PNC Bank, and Capital One. Steve serves on several CISO boards and frequently presents at conferences such as InfoSeCon, Cyber Defense Summit, Blackhat, and others. Steve attended UNC-CH but left early to start his own IT and Cyber Security consulting company, ultimately receiving his degree in Business from East Carolina University. Steve and his wife have two daughters and a son. Steve currently resides in the beautiful western mountains of North Carolina.
Colby HoeferSecurity Specialist, InfobloxColby has worked in the tech industry for the last decade as a Cyber Threat Analyst, Professional Services Engineer, Business Development Manager, and now as a Cybersecurity Specialist with Infoblox. Prior to working in the tech industry, Colby spent a decade as a machine gunner in the U.S. Marine Corps. Colby was born in the small town of Higginsville, Missouri, and now resides with his wife of 17 years and three kids outside of Raleigh, North Carolina. He enjoys spending his downtime playing Nintendo with his kids, cooking with his wife, and ripping around on motorcycles.
Phillip OgleSr. Solutions Engineer, Enterprise, SpyCloudPhillip Ogle is a Senior Solutions Engineer on SpyCloud’s Investigations Team, where he helps organizations defend against identity-based threats including account takeover, ransomware, and fraud. He works closely with security teams to operationalize breach, malware, stolen session, and phishing data to uncover hidden risk across the darknet and beyond.
With more than 20 years of experience in cybersecurity, Phillip has held roles at Trend Micro, HP Enterprise Security, Intel, and McAfee. He brings a practitioner’s perspective and a passion for translating threat intelligence into real-world defensive action.
Scott Dickinson, ModeratorCISO, AnMed HealthScott Dickinson is passionate about Information Technology and Information Security and has more than 20 years in the fields of information security and information technology. He has worked with Federal and State governments to include FBI, DOD, Veteran Affairs, State of SC, and the private sector. He has been a CIO, a CISO, a virtual CISO, Cyber Security Division Director and a variety of positions leading up to those roles. He currently serves as the CISO at AnMed. He enjoys being exceptional as a security leader and is constantly looking for ways to improve the security posture of companies. He currently holds the CISSP and CCSP certifications.
Matt PourDirector, Solution Engineering, IslandMatthew Pour is a seasoned leader in Information Technology and Information Security, currently leading Island's North America Solutions Engineers. With decades of experience, he has successfully established ITIL practices and InfoSec programs for Fortune 500 companies and engineered solutions for complex business challenges at leading technology and cybersecurity firms. Previously, Matthew served as a Field CTO at Broadcom and held key technical leadership roles at Symantec, Blue Coat, and IBM, consistently demonstrating his strategic vision and expertise in navigating the evolving landscape of information security.
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Jermaine GreenManager, CIP Monitoring, SERC Reliability CorporationJermaine Green, CISA, CISSP, and a 2025 Cisco Champion, is a seasoned Cybersecurity CIP Audit Manager at SERC Reliability Corporation. In his role, Jermaine leads the CIP Audit team to ensure that power companies across the Southeastern United States maintain reliable and secure operations in compliance with critical infrastructure protection standards. With a robust background in network engineering, wireless technologies, and firewall management, he brings a wealth of expertise to safeguarding the region’s power grid. His technical acumen and commitment to operational excellence make him a vital contributor to the cybersecurity and reliability of critical infrastructure.
Joe TrombaLegal Counsel, SERC Reliability CorporationJoseph Tromba brings almost five years of experience in the energy industry and seven years of experience as an attorney. As an Enforcement attorney, he has made significant contributions to many different projects and initiatives at SERC and the ERO Enterprise.
With a background in business management in college then primarily intellectual property law throughout law school, Joseph started his legal career as an Associate Attorney at Glynn, Mercep, and Purcell LLP (GMP) in East Setauket, New York. During his tenure at GMP, Joseph concentrated in many different types of civil litigation. His practice areas included, but were not limited to, real property litigation, commercial litigation, personal injury litigation, construction litigation, trust litigation, restrictive covenants, product liability, breach of contract, defamation, civil forfeiture, traffic violations, real estate transactions, and the drafting and execution of wills. As outside counsel, he aided and assisted in board meetings, disciplinary hearings, and depositions. Joseph received one of the Top 100 Personal Injury Settlements, which was also one of the Top 50 Motor Vehicle Accident Settlements, in New York in the year 2019.
Since June 2021, Joseph has been involved in SERC’s Enforcement department where he has acted as the case manager for a number of noncompliances involving different entities and including various CIP and O&P NERC Reliability Standards. He has had several other responsibilities as well, such as handling Procurement at SERC Reliability Corporation and hosting the official SERC Podcast, “What’s the Bright Idea with SERC”. Before Joseph’s time at SERC and in the energy industry, he previously published an article that provides an analysis of the Fair Use Doctrine in copyright law.
Joseph is a staunch advocate for leaving a positive impact, believing strongly in leaving this world better than how you found it. By extension, he is dedicated to improving both SERC and the energy industry, aiming to leave a positive impact that will continue on.
Stephen DoughertyPrincipal Investigator & CEO, Rexxfield / Dougherty Intelligence & InvestigationsStephen is an accomplished U.S. Secret Service investigator with 9-plus years of experience leading complex cybercrime, financial fraud, and international cybercrime investigations. He is recognized for pioneering the U.S. Secret Service’s Business Email Compromise Mission Desk, resulting in the recovery of nearly $500 million in victim funds. He was awarded two U.S. Secret Service Director’s Impact Awards, 2021 U.S. Secret Service Employee of the Year Award, and two DHS Secretary’s Gold Medals of Excellence for outstanding leadership, innovation, and impact. Stephen is an experienced public speaker and instructor, having delivered more than 50 global keynotes to executives, policymakers, and law enforcement on topics including cyber-enabled financial crime, digital forensics, and public-private collaboration. He is dedicated to bridging the gap between law enforcement, government, and the private sector to combat the world’s most sophisticated digital threats through intelligence-driven investigations, rapid response, and cross-border partnerships.
Daniel WatersStrategy and Transformation Leader, AccessIT GroupDaniel is the Strategy and Transformation leader at AccessIT Group, where he leads a high-performance team to advance clients' cybersecurity ambitions through strategic problem-solving and execution.
Professional Summary and Key Highlights:
• Daniel grew up and began his career in Australia, before moving to the US with Deloitte with whom he spent a decade of his professional life.
• Has served Fortune 500 through to mid market extensively - US and Global.
• Extensive experience cross market and cross culture, NAM, LATAM, APAC, EMEA.
• Experienced with addressing challenges involving cyber risk, geopolitical and geostrategic complexities.
• History of driving resource conscious organizations to capability target states.
• Currently resides in Jacksonville, Florida.In addition, Daniel works extensively with KKR overseeing portfolio company cybersecurity risk.
Travis MoranSenior Security & Regulatory Affairs Advisor, SERC Reliability CorporationTravis Moran is a retired law enforcement professional with over 30 years of enforcement, security, and intelligence experience with Interpol, the U.S. Department of State and U.S. Department of Justice, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). He serves as the Senior State Government & Regulatory Affairs Advisor, for SERC Reliability Corporation. SERC is specifically responsible for the reliability and security of the electric grid across the southeastern and central regions of the United States.
Chris BellVP of Strategic Accounts, SeceonIT and managed security sales specialist with over fifteen years of experience. Proficient at gathering business requirements, analyzing business needs, and presenting technology strategies and solutions that align with business objectives. My main goal is to help the enterprise increase user productivity, decrease risk and control costs.
Specialties: Cybersecurity, EDR, MDR and XDR services, Managed aiSIEM, Penetration Testing & Vulnerability Assessment, Managed IT Services, Virtualization, Data Storage and Protection, Data Center Solutions, Disaster Recovery Expertise and Network Infrastructure Solutions.
Mike BurchDirector of Application Security, Security JourneyMichael is an Ex-Army Green Beret turned application security engineer. Currently, he serves as the senior enlisted Cyber Network Defender for the North Carolina National Guard. In his civilian career, he is the Director of Application Security and content team lead for Security Journey, a SaaS-based application security training platform. He leverages his security knowledge and experience as a developer to educate and challenge other developers to be a part of the security team.
Mathew Martin, ModeratorCISO & Privacy Officer, Western Carolina University
Matthew BurroughsCISO, Novolex
Nathanael DickDirector, Cybersecurity and Governance, SteelFab, Inc.Nathanael Dick, CISSP, MBA, is the Director of Cybersecurity and Governance at SteelFab, Inc. in Charlotte. He leads the company's cybersecurity initiatives and is passionate about leveraging compliance as a tool to enhance organizational cyber maturity. In his free time, Nathanael cohosts the Cybersecurity podcast, discussing cybersecurity topics in a frank open atmosphere.
Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
Jackson HarrowerProduct Marketing Manager, Harmonic SecurityJackson Harrower leads product marketing at Harmonic Security, the premier platform for enabling employees to safely leverage AI tools while protecting sensitive data. Previously, Jackson served as Chief of Staff at Riscosity, a data security provider for application-layer traffic between private clouds and data subprocessors.
Chris RodriguezSecurity Specialist, Splunk, a Cisco CompanyChristopher Rodriguez is a Security Specialist at Splunk, a Cisco Company, advising Telecommunications, Media, and Cloud Service Providers throughout the Americas on modernizing security operations. His work focuses on SIEM transformation and advancing unified approaches to threat detection, investigation, and response.
He brings more than15 years of experience at a major telecommunications provider across mobility, network infrastructure, and cybersecurity. A Certified Information Systems Security Professional (CISSP) since 2020, he contributes thought leadership on digital resilience and emerging cybersecurity challenges facing enterprise organizations.
William Curtiss, ModeratorGlobal Head of IT Infrastructure & Cybersecurity, Owens Corning Glass Reinforcements
Benjamin AgnerSVP | Network Security & DLP Engineering, Truist
Justyn HornorCEO, I/ONXJustyn Hornor is a seven-time founder, five-time patent holder, and Techstars NYC alum with deep roots in artificial intelligence and advanced product development. A serial deep-tech entrepreneur, he has built and scaled multiple ventures at the intersection of AI, infrastructure, and enterprise innovation.
As the Founder and CEO of I/ONX High Compute Processing (HPC), Justyn leads a global organization redefining how enterprises deploy and scale AI. I/ONX is a leader in flexible, heterogeneous, and secure AI infrastructure solutions—revolutionizing and accelerating high-performance computing environments while eliminating dependence on any single hardware or software provider and mitigating supply chain constraints. Under his leadership, I/ONX has pioneered a composable, hardware-agnostic ecosystem designed to unlock performance, resilience, and long-term strategic freedom for enterprise customers.
Justyn is the principal inventor behind I/ONX’s heterogeneous compute ecosystem and holds five patents spanning advanced infrastructure and AI technologies. Throughout his career, he has led high-performing product teams across multiple industries within some of the world’s largest enterprises. He is known for bridging complex customer challenges with state-of-the-art, scalable technology solutions—translating deep technical innovation into measurable business outcomes.
He holds a B.S. in Business Management and an M.S. in Computer Information Systems from the University of Phoenix.
Sherri LeachvCISO, Cyber Centurion
John ScrimsherGlobal CISO, Kontoor BrandsJohn Scrimsher is a globally recognized cybersecurity leader with over three decades of experience shaping secure digital transformation across industries. As a seasoned Chief Information Security Officer and strategist, John has driven measurable improvements in security posture for multinational enterprises, blending deep technical insight with executive leadership to align business risk with robust cyber defenses. With a career spanning operational, strategic, and board-level roles, he has helped organizations navigate emerging threats, mature security programs, and foster resilient cultures of risk awareness.
A trusted voice in the cybersecurity community, John speaks and writes frequently on topics including governance, risk management, security technologies, and cyber resilience. His pragmatic approach bridges the gap between complex threat landscapes and actionable, business-focused solutions; empowering leaders and practitioners alike to make better decisions in an increasingly interconnected world.
Kevin Shulz-WadeSr. Security Engineering Manager - AI Security, Lowe's Companies, Inc.
John Opala, PhD, ModeratorVP IT & Global CISO, Hanesbrands Inc.Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.
Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.
In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.
John Opala, PhDVP & Global CISO, HanesBrands Inc.Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.
Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.
In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.

























