Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, March 17, 2026
    9:00 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Your CEO just asked about AI security.  Do you have a clear answer?
    While you’re counting vulnerabilities, your competitors are deploying AI at scale.
    While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.
    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.  And your cybersecurity team? Still writing policies nobody reads.
    In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
    What You’ll Master
    • The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    • Executive Translation — Turn technical AI risks into boardroom language
    • NIST AI RMF Implementation — Practical application, not theory
    • The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    • Shadow AI Discovery — Find and govern the AI already in your organization
    • Business-First Security — Protect value, not just systems
    Who Should Attend
    Ideal for:
    • CISOs facing board questions about AI
    • Information Security Directors enabling digital transformation
    • IT VPs without dedicated security teams
    • Cybersecurity Consultants serving enterprise clients
    • Risk Managers governing AI initiatives
    • Aspiring decision makers and those reporting to one
    Not designed for:
    • Developers wanting to code AI models
    • Analysts seeking technical certifications
    • Anyone looking for hands-on hacking labs
    What This Workshop Is (and Isn’t)
    This workshop is NOT about:
    • Prompt injection techniques
    • Model architecture security
    • Technical vulnerability scanning
    • Writing 200-page policies
    This workshop IS about:
    • Speaking profit-and-loss to executives
    • Enabling your AI transformations
    • Building cybersecurity into AI from day one
    • Becoming the trusted AI advisor
    What You’ll Leave With
    1. The Complete AIR-MAP Toolkit
    • 90-day implementation roadmap
    • Discovery templates and workflows
    • Risk scoring calculators
    • Executive presentation templates
    2. Ready-to-Deploy Governance Assets
    • AI Acceptable Use Policy (customize in minutes)
    • Vendor assessment questionnaires
    • Incident Response playbooks
    3. A 30-Minute Strategy Session
    A complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture.
  • Wednesday, March 18, 2026
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Reducing Risk by Embracing Secure AI Solutions
    speaker photo
    Director, Infrastructure & Security, National Gypsum
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    It seems we are all very busy with AI and the explosion of AI solutions, with increased risks coming along for the rocket ship ride! What are you and your teams doing to address the AI solutions and services that your company is engaged in?

    At NGC, we are “embracing AI” and have been for some time. Let’s have a peer-to-peer discussion and walk through:

    • What are you and your teams doing to make this a safe and less risky path for everyone? Please share any clear steps or processes that you are following.
    • What successes have you had?
    • What are your biggest challenges?

    Let’s all learn from one another regarding safe and secure AI adoption.

    8:00 am
    Lake Norman & Charlotte IT Professionals Chapter Meeting
    • session level icon
    The Human Layer: AI, Cyber Risk, and Workforce Evolution
    speaker photo
    Program Director, Human-Centered AI, The University of North Carolina at Charlotte
    speaker photo
    CISO & Infrastructure Services, Cava
    speaker photo
    CISO, Discovery Education
    speaker photo
    CIO/CISO, Elevate Textiles
    speaker photo
    Chief Security Officer, Gartner
    speaker photo
    Sr. Manager, Digital Employee Experience, Under Armour
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    This panel explores the critical intersection of artificial intelligence, cybersecurity risk, and the evolving workforce through a compelling cake-layer metaphor.
    Modern organizations, like a layered cake, are built from foundational cyber infrastructure at the base, an accelerating AI layer in the middle, and the workforce at the top. Success depends on how well these layers align. As AI rapidly transforms business operations, it simultaneously reshapes the threat landscape and redefines the role of the modern workforce. While organizations invest heavily in advanced technologies, the human layer remains both the greatest vulnerability and the strongest line of defense—the essential binding ingredient that turns technology investment into resilience, trust, and sustainable growth.
    Join industry experts for a forward-looking discussion on balancing innovation, resilience, and responsibility in the age of AI.
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] The Future of IP in a Digital World: Redefining IP Risk & Opportunity in the Age of AI & Cyber
    • session level icon
    Focus Areas: AI Model Security; Intellectual Property; Cyber-Resilient Innovation & Governance; Algorithmic Theft; Data Poisoning Defense
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Intellectual property is no longer just a legal asset, it is a dynamic, digital target. In an era defined by artificial intelligence, autonomous systems, and persistent cyber threats, the traditional boundaries of IP protection are dissolving. Today’s adversaries don’t just steal information; they extract models, replicate innovation at scale, manipulate training data, and weaponize digital access to undermine competitive advantage.

    This keynote explores how AI and cyber capabilities are fundamentally reshaping intellectual property risk. From model inversion and prompt injection to algorithmic theft and data poisoning, the threat landscape is evolving faster than most organizations can measure it. At the same time, AI presents unprecedented opportunity, accelerating innovation, enhancing detection, and redefining how IP is created, protected, and monetized.

    Attendees will gain a forward-looking framework for understanding modern IP exposure, governance blind spots, and the strategic decisions leaders must make to protect competitive advantage in a world where digital replication is instant and global. The future of IP will not be defended solely in courtrooms, it will be secured through architecture, policy, and proactive cyber resilience.

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    Continue the Conversation with Opening Keynote Speaker Dr. Cole
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall
    Want to know more about why Dr. Eric Cole thinks the old CISO model is broken? Or how to be a better manager, leader, or team player? Or do you just want to chat more with the good doctor after his motivating keynote? Either way, come join this bonus session in the Networking Lounge immediately after his opening keynote.
    10:15 am
    [Panel] Who Are You? A Quick Look at Identity with Regard to Cybersecurity
    • session level icon
    Focus Areas: Identity & Access Management (IAM); Authentication and Authorization; Zero Trust
    speaker photo
    Chief of Staff, Cyber and Third-Party Tech Risk Team, AT&T
    speaker photo
    Identity & Access Management, AT&T
    speaker photo
    Identity and Access Management – Risks, Issues, Controls and Governance, AT&T
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    During this session, we will dig into how and why access is controlled, what is the difference between authentication and authorization, is MFA and 2FA the same thing, what is RBAC, and why some people and organizations call Identity Management the “first line of defense in cybersecurity.”
    10:15 am
    [Panel] Bridging the Gap: The Role of the BISO in Modern Cybersecurity
    • session level icon
    Focus Areas: Business Information Security Officer (BISO); Executive Alignment; Security Career Paths
    speaker photo
    Sr. Director, BISO, Compass Group
    speaker photo
    BISO/CISO, ILIAS Federal Solutions (IFED), Inc.
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am
    As cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.
    In this engaging panel discussion, regional BISOs  share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.
    Attendees will gain:
    Join us to explore the intersection of business and security and how mastering both can accelerate your career.
    10:15 am
    Data Security: The Missing Context
    • session level icon
    Focus Areas: Contextual Data Readiness & ROA; Gen AI: Securing the "Force Multiplier"; Maximizing Existing Security ROI
    speaker photo
    Director, Engineering, Concentric AI
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.

    Attend this session to learn:

    • Why traditional approaches to data security have failed
    • How AI and context are revolutionizing data security
    • Where to maximize the value of your existing security investments
    • What you can do to secure your Gen AI rollouts

    With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

    10:15 am
    [Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral Analytics
    Focus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access Governance
    speaker photo
    Solutions Engineer, Netwrix
    speaker photo
    Director, Enterprise Sales Engineering - Great Lakes, Arctic Wolf
    speaker photo
    Director of Engineering, Ping Identity
    speaker photo
    Head of Technology Risk, Acrisure
    Registration Level:
    10:15 am - 10:50 am

    The human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.

    Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    Top 10 Most-Needed AI Skills in Cybersecurity – "Draft Day" to Accelerate Your Career
    speaker photo
    Lead Information Security Analyst, TIAA
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    This bonus session in the Networking Hall will name the top 10 AI skills needed in cybersecurity now and explain why they are in such high demand. This ranking has been compiled based on Charles Hartley’s external and internal research as a senior content specialist for TIAA’s Cybersecurity Awareness Team. This will be a unique presentation in the style of the NFL’s Draft Day. Commissioner Hartley, “with the next pick in the AI career draft….”

    11:10 am
    The Human Side of Cybersecurity
    • session level icon
    Focus Areas: Security Culture; Security Awareness Training; Social Engineering
    speaker photo
    Sr. Information Security Analyst, LPL Financial
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    This session focuses on the human side of cybersecurity. It’s important because with today’s evolving threats, technology controls won’t always protect your business. Increasingly sophisticated attacks often rely on human error for success, rather than just technical flaws or vulnerabilities. Humans are the first line of defense, and by building a stronger security culture, your business can better identify social engineering tactics to reduce risk and have a staff that is more security conscious.

    11:10 am
    From Identity Controls to Business Impact: Making IAM Work for Leaders
    • session level icon
    Focus Areas: IAM Strategy & Business Alignment; Risk & Cost Optimization; Executive Communication & GRC
    speaker photo
    VP, Information Security, Pathward
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am
    Identity and Access Management is no longer just a technical control—it’s a business enabler. This session helps security and business leaders rethink IAM through the lens of outcomes, not tools. Using real-world examples from regulated environments, attendees will learn how to prioritize IAM initiatives that reduce risk, lower cost, and improve workforce experience. The talk focuses on practical decision-making, balancing security, usability, and feasibility, and avoiding common pitfalls that stall IAM programs. Attendees will walk away with a clear framework for aligning IAM investments to business priorities and communicating value to executive stakeholders.
    11:10 am
    Kill the Attack Chain: Stop Ransomware Before It Starts
    • session level icon
    Focus Areas: Ransomware Defense & Resilience; Zero Trust & Microsegmentation; Cyber Kill Chain Strategy
    speaker photo
    Director, Security Strategy & Technology, Akamai
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Ransomware continues to escalate despite increased security investments because the encryption is only one step in a broader attack chain. By focusing on the full kill chain, security teams gain more opportunities to stop attackers before widespread damage occurs.

    Learn how micro segmentation can disrupt adversarial techniques before and after ransomware deployment. Discover how shifting your strategy to the entire attack chain can reduce risk, limit impact, and accelerate recovery. Learn how to:

    • Disrupt the kill chain before ransomware is deployed
    • Use AI to map complex environments and accelerate policy enforcement
    • Leverage segmentation to enable rapid remediation without disrupting operations
    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    speaker photo
    Cybersecurity Consulting Manager, AccessIT Group
    speaker photo
    CISO, SecurityScorecard
    speaker photo
    Security Specialist, Infoblox
    speaker photo
    Sr. Solutions Engineer, Enterprise, SpyCloud
    speaker photo
    CISO, AnMed Health
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] Governance at the Edge: Balancing GenAI Innovation with Enterprise Control
    • session level icon
    Focus Areas: Shadow AI; Data Exfiltration Risk; AI Readiness & Financial Performance (ROA); Browser-Based Identity & Policy Enforcement
    speaker photo
    Director, Solution Engineering, Island
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Everyone is using GenAI apps, and most are accessed via the browser. Are you able to see it, understand it, and adopt it safely?

    This keynote session addresses the No. 1 concern among corporate leaders: realizing the benefits of GenAI adoption while retaining the data controls, policy enforcement, and compliance that enterprises need.

    Matt Pour will cover:

    • The risks associated with Shadow AI and lack of visibility
    • How data leaks into unapproved AI apps, including employees uploading/copying/pasting sensitive data into unmanaged AI tools
    • How you can gain visibility in AI activity and design policies that safely enables AI usage
    • Other tips for managing employee use of AI within corporate boundaries
    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Achieving True Resilience in the AI Era
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    In the cybersecurity arena, AI technology presents new possibilities for both defenders and attackers. The key to withstanding the next evolution of cyber threats? A resilient identity infrastructure.
    Whether your organization uses a specific vendor tool or runs a mix of systems and solutions, identity is your digital foundation of trust. If identity is compromised, your organization’s ability to operate is at risk.

    Join this closed-door, invitation-only, peer-to-peer discussion to learn insights and practical strategies for building your identity, cyber, and business resilience. This open forum exchange explores:

    • What does it take to plan for true cyber resilience?
    • What happens when your identity infrastructure is under attack?
    • How do you manage the complexities of a hybrid identity environment?
    • How can security, identity, IT, and business leaders work together to ensure resilience across the entire cyber lifecycle?
    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber on the Grid: NERC CIP Audits & Enforcement
    speaker photo
    Manager, CIP Monitoring, SERC Reliability Corporation
    speaker photo
    Legal Counsel, SERC Reliability Corporation
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    This discussion delves into NERC CIP standards, detailing their history, governance, and structure to enhance cybersecurity for the Bulk Electric System (BES). Attendees will explore how these standards align with risk-based audits, addressing asset identification, secure access controls, and incident response. Key insights include the standards’ modular framework, governance by FERC and regional entities, and their evolution to safeguard North America’s power grid. The session highlights risk-based monitoring to ensure compliance and effective threat mitigation, offering actionable guidance for professionals navigating NERC CIP in a dynamic regulatory environment.

    This discussion will also address what happens when a registered entity is deemed to be noncompliant with a standard and what that enforcement process looks like, including how findings are documented, how mitigation plans are developed and tracked, and how enforcement outcomes are determined.

    1:15 pm
    BEC Bang! A Business Email Compromise Table-Top Exercise
    • session level icon
    Focus Areas: Business Email Compromise (BEC); Incideent Response; Tabletop Excercise
    speaker photo
    Principal Investigator & CEO, Rexxfield / Dougherty Intelligence & Investigations
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    In this interactive, table-top exercise session, the audience is divided into 2 or 3 separate groups and designated as companies or entities doing business together. A BEC incident is introduced, and the group is asked to tabletop how to remedy the BEC incident from different perspectives of financial victims, compromise victims, and affected third parties. A gamification of the participation will show which group would have the better chance at a proper recovery based on prior investigations and incidents.

    1:15 pm
    Technology Rationalization in the Age of AI: A Strategic Approach to Cyber Resilience
    • session level icon
    Focus Areas: Rationalization & Financial Performance; Complexity Risk & the "AI Friction Tax"; Engineered Resilience for Autonomous Systems
    speaker photo
    Strategy and Transformation Leader, AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    Technology rationalization has been a standing objective for many security leaders, yet it has consistently been deprioritized in favor of more immediate initiatives. Historically, the cost of deferral was tolerable. That is no longer the case.

    Modern security environments are increasingly fragmented—characterized by excessive vendor sprawl, overlapping capabilities, redundant tooling, and limited end-to-end visibility. This complexity not only inflates cost but also undermines operational effectiveness and governance. As AI becomes embedded across security operations, software development lifecycles, business workflows, and autonomous systems, the risks associated with an unrationalized environment accelerate significantly.

    This session outlines why rationalization must move from operational backlog to strategic agenda. Participants will examine a structured approach to evaluating their current technology stack, identifying underperforming or duplicative investments, aligning capabilities to measurable business risk, and establishing a foundation that can be governed effectively in an AI-enabled enterprise.

    Designed for CISOs, security leaders, and technology executives, this session provides both the strategic framing and practical considerations required to drive meaningful rationalization at the enterprise level.

    1:15 pm
    Interdependency: The Emerging Operational Security Dependencies Between Data Centers and Electric Utilities
    • session level icon
    Focus Areas: Critical Infrastructure; Operational Technology (OT); Supply Chain Risk Management
    speaker photo
    Senior Security & Regulatory Affairs Advisor, SERC Reliability Corporation
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    The critical role of data centers in sustaining global economic health and societal function has been widely acknowledged and scrutinized. Increasingly recognized as critical infrastructure, data centers operate around the clock to provide essential services. As digital infrastructure continues to advance, data centers are entering a new era shaped by artificial intelligence (AI) and high-performance computing. These facilities require uninterrupted, stable electricity from their serving utilities to maintain operational efficiency. This dependency creates a reciprocal relationship in which the reliability and security of the utility directly impact the reliability and security of the data center, and vice versa.

    1:15 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    speaker photo
    VP of Strategic Accounts, Seceon
    speaker photo
    Director of Application Security, Security Journey
    speaker photo
    CISO & Privacy Officer, Western Carolina University
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Ask Me Anything! A Live Conversation with Security Leader
    speaker photo
    CISO, Novolex
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    Session details to come.

    2:10 pm
    Creating a Resilient Compliance Culture with CMMC
    • session level icon
    Focus Areas: CMMC (Cybersecurity Maturity Model Certification); Compliance and Regulatory Affairs; Security Culture
    speaker photo
    Director, Cybersecurity and Governance, SteelFab, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    With the final CMMC rule now published and enforcement set to begin for new U.S. Department of War contracts, companies across the supply chain are facing a major shift in how compliance, cybersecurity, and business success intersect. In this session, we’ll explore how companies can achieve CMMC compliance; not just to meet regulations, but to build a stronger, more resilient security culture.
    We’ll walk through practical steps to roll out new requirements to your employees and embed security and compliance into day-to-day business operations. Whether your business is already working with defense contracts or simply wants a more robust approach to compliance and security, you’ll leave with actionable ideas you can apply now.
    2:10 pm
    Your Internal AI: Empowering Innovation While Reducing Inadvertent Insider Threats 
    • session level icon
    Focus Areas: AI Security & Governance; Insider Risk Management; Data Privacy & Compliance
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    The explosive adoption of generative AI and large language models (LLMs) has transformed how organizations work, enabling employees at all levels to accelerate tasks, generate insights, and drive innovation. Yet this democratization of AI potentially introduces a significant and often overlooked risk: inadvertent insider threats.
    This presentation examines how the convenience of “unsubscribed” mainstream AI tools has dramatically increased the attack surface for data exfiltration through non-malicious insider actions. We will explore real-world consequences, regulatory implications, and the growing awareness gap that leaves even sophisticated organizations vulnerable.
    The core message is one of empowerment rather than restriction: organizations can and should provide their teams with the full power of state-of-the-art LLMs without compromising security. “Your Internal AI” introduces a secure, enterprise-ready alternative that enables seamless use of mainstream models while automatically safeguarding sensitive information.
    Through intelligent pre-processing, redaction, anonymization, and policy enforcement, sensitive data is protected before it ever leaves the organization’s control, ensuring compliance and preserving privacy.
    Attendees will see this solution in action through a live demonstration, illustrating how users can interact naturally with powerful LLMs in everyday business related activities, while the system transparently secures confidential content in real-time.
    By the end of the session, participants will understand not only the risks posed by unchecked AI usage but also how to deploy “Your Internal AI” as a strategic enabler: delivering the productivity gains of cutting-edge AI to every employee, securely and responsibly.
    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    speaker photo
    Product Marketing Manager, Harmonic Security
    speaker photo
    Security Specialist, Splunk, a Cisco Company
    speaker photo
    Global Head of IT Infrastructure & Cybersecurity, Owens Corning Glass Reinforcements
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:10 pm
    AI Infrastructure as Strategic Enterprise Infrastructure: Sovereignty, Security, and Resilience with Heterogeneous HPC
    • session level icon
    Focus Areas: AI Infrastructur; Sovereign Resilience; HPC Security & Hardware-Level Trust; Strategic AI Governance (ROI)
    speaker photo
    SVP | Network Security & DLP Engineering, Truist
    speaker photo
    CEO, I/ONX
    speaker photo
    vCISO, Cyber Centurion
    speaker photo
    Global CISO, Kontoor Brands
    speaker photo
    Sr. Security Engineering Manager - AI Security, Lowe's Companies, Inc.
    speaker photo
    VP IT & Global CISO, Hanesbrands Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    For decades, data centers were viewed as back-office-utilities important, but largely operational. That paradigm has changed. Today, AI compute infrastructure sits at the heart of enterprise competitiveness, national economic security, and regulatory scrutiny. AI models are only as powerful as the infrastructure that trains and runs them and that infrastructure is now being treated as critical.

    As geopolitical tensions reshape supply chains, and as data sovereignty and AI governance regulations accelerate globally, CIOs and CISOs are being asked to ensure that AI environments are not only high-performing, but secure, resilient, and sovereign-ready.

    We’ll explore how organizations are building hardware-level trust, reducing supply chain risk, designing performance and security to reinforce each other, and ensuring workload portability across heterogeneous environments including emerging models like those enabled by I/ONX High Performance Compute.

    The central question for today: “In an era of AI-driven disruption, what does strategic resilience really look like for enterprise AI infrastructure?”

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] The Changing Dynamics of the Role of a CISO in the Age of AI
    • session level icon
    Focus Areas: CISO Strategy; AI Governance and Ethics; Proactive Risk Management
    speaker photo
    VP & Global CISO, HanesBrands Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    As the role of CISO continues to evolve, several key trends are shaping the future responsibilities of individuals in this position and their teams:

    1. There is a noticeable trend towards increased scrutiny on the decision-making processes of CISOs. Stakeholders are placing a greater emphasis on understanding and evaluating the rationale behind cybersecurity strategies and actions.

    2. Ethical considerations in handling data breaches are becoming a focal point for CISOs. It is essential for CISOs to not only address breaches effectively but also to do so in an ethical manner that prioritizes the protection of individuals’ data and privacy.

    3. The landscape of regulations governing CISO roles may be shifting towards more stringent requirements. CISOs may need to navigate a complex web of compliance standards and regulations to ensure the organization’s cybersecurity practices align with legal expectations.

    4. Proactive cybersecurity measures are gaining importance within organizations. CISOs are expected to anticipate and mitigate potential threats before they materialize, rather than solely reacting to incidents after they occur.

    5. Building a culture of transparency and accountability within CISO teams is emerging as a critical focus area. CISOs are tasked with fostering an environment where team members feel empowered to raise concerns, share information, and take ownership of cybersecurity initiatives.

    Hear how CISOs and their teams can navigate the new age of cybersecurity, one that is continually evolving.
    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Sponsored by AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    Generously sponsored by:

Exhibitors
  • AccessIT Group
    Booth: 300

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Akamai Technologies
    Booth: 315

    Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. With the most distributed compute platform—cloud to edge—customers can build modern apps while keeping experiences closer to users and threats farther away. Learn about Akamai’s security, compute, and delivery solutions at akamai.com.

  • Anzenna
    Booth: TBD

    Anzenna provides advanced security solutions that streamline the investigation of identity threats by integrating multiple security tools and reducing the need for extensive manual operations.

  • Arctic Wolf Networks
    Booth: 240

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Axonius
    Booth: 300

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Black Duck
    Booth: 135

    Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.

  • Canary Trap
    Booth: 220

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Centripetal
    Booth: 400

    Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.

  • Chainguard
    Booth: 155

    Chainguard Images provide the building blocks for a secure software supply chain. Leverage container images that have cryptographic signatures, SBOMs, SLSA provenance, and more to help meet compliance and prevent supply chain attacks.

  • Charlotte IT Professionals
    Booth: TBD

    We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.

  • Charlotte Metro ISC2
    Booth: TBD

    The Charlotte Metro ISC2 chapter is a 501c3 non-profit organization, whose mission is to advance information security in the local communities throughout the Charlotte Metro area. We provide our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate. We are committed to engaging in public service activities and outreach to advance cybersecurity awareness in the broader community.

  • Charlotte Metro ISSA
    Booth: TBD

    The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.

  • Check Point Software Technologies
    Booth: 300

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Clarity Security
    Booth: 225

    Clarity Security makes identity governance autonomous, intelligent, and effortless. Powered by attribute-based access control, we automate user access reviews and every aspect of identity lifecycle management—saving time, cutting cost, reducing risk, and turning IT into a business enabler.

  • Claroty
    Booth: 400

    Claroty empowers organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, threat detection, and secure remote access. Backed by the world’s largest investment firms and industrial automation vendors, Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America.

  • Cloud Security Alliance Charlotte Chapter
    Booth: TBD

    CSA chapter membership allows opportunities for continued learning, security awareness, networking, and career growth.

    • Network with peers and subject matter experts
    • Gain valuable insight from industry professionals and peers
    • Build cloud security awareness at the community level
    • Participate in cloud security education and training locally
    • Participate in CSA research and development
    • Discuss cloud vulnerabilities and brainstorm solutions
    • Be a leader in the cloud security field
    • Member discounts on training and exams
  • Cofense
    Booth: 223

    Cofense® is the original and leading provider of security awareness training and email phishing simulation, offering global enterprise-level advanced email threat detection and remediation solutions. Cofense PhishMe® and Cofense Phishing Detection and Response (PDR) offer the world’s only platforms to leverage over 35 million Cofense-trained employees who actively report suspected phishing and other dangerous email threats in real-time. Exclusive only to Cofense, this reporting system ingests and catalogs thousands of threats per day that are missed by current email gateway technologies and then eradicates those threats from customer inboxes. In short, Cofense sees and stops threats other email security systems miss. Please visit www.cofense.com or connect with us on X and LinkedIn for additional information.

  • Concentric AI
    Booth: 325

    Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.

  • Corelight
    Booth: 300

    Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com

  • Darktrace
    Booth: TBD

    Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.

  • Delinea
    Booth: 205

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • Exabeam
    Booth: 150

    Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution. With consistent leadership in AI innovation and a proven track record in security information and event management (SIEM) and user behavior analytics, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline operations. Learn more at www.exabeam.com.

  • Expel
    Booth: 300

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • Global Private Cloud Network (GPCN)
    Booth: 400

    The Global Private Cloud Network (GPCN) provides private cloud compute across the world in Tier 3 data centers on a pay-per-use basis.

  • Halcyon, Inc
    Booth: TBD

    Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. Halcyon’s core platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes. To learn more and get a demo, contact us today.

  • Harmonic Security
    Booth: 430

    Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.

    Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.

  • ISACA Charlotte
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

  • Infoblox
    Booth: 230

    Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.

  • I/ONX
    Booth: 400

    IONX is pioneering a new global standard that benefits all governments and enterprises with AI compute. I/ONX’s platform is the world’s first future ready, mixed processor compute solution that guarantees data sovereignty, derisks supply chain availability, eliminates vendor lock, improves efficiency, and enables scalability.

  • Island
    Booth: 320

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • Knightz Group
    Booth: 400

    Knightz Group is a boutique cybersecurity firm, blending enterprise-level expertise with nimble, client-first execution. We provide and manage compliance driven, operationally focused solutions for complex environments.

  • Lake Norman IT Professionals
    Booth: TBD

    Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!

  • Lightbeam
    Booth: 210

    LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.

  • Logically
    Booth: 120

    Logically is a leading national managed security and IT solution provider that helps organizations secure and support their businesses today, solve for tomorrow, and strategize for the future with cyber-first solutions. Our team of experts, including cybersecurity, engineering, networking, and cloud specialists, collaborate with customers to implement solutions that protect their assets, reduce risk, and optimize performance, end to end. Since 1999, we have made long-term relationships, customer service excellence, and purposeful innovation guiding principles to ensure customers have a trusted advisor at their side, helping them focus on their business, not the technology behind it.

  • Netskope
    Booth: 300

    Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.

  • Netwrix
    Booth: 450

    Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact.
    More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.

  • Nudge Security
    Booth: 215

    Nudge Security is a SaaS security company offering a platform to manage and secure an organization’s SaaS applications. The platform provides visibility and governance over SaaS and cloud assets, including shadow IT, and quickly discovers SaaS accounts via read-only API access. It also delivers vendor security profiles, compliance attestations, and alerts for SaaS supply chain breaches.

  • Optiv
    Booth: 500

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Ovalix, Inc.
    Booth: 110

    Ovalix empowers organizations to confidently embrace AI technology by mitigating associated risks such as data leakage, malicious prompts, shadow AI, and regulatory non-compliance across AI applications ranging from basic LLMs to sophisticated AI Agents. By ensuring robust security, maintaining regulatory integrity, and preventing data breaches, Ovalix enables organizations to unlock the transformative power of AI with peace of mind.

  • Phish Club
    Booth: TBD

    Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.

    Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!

  • Ping Identity
    Booth: 440

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • Qualys, Inc.
    Booth: TBD

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • Saviynt
    Booth: 133

    Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience.

  • Seceon Inc.
    Booth: 242

    Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.

    What Sets Seceon Apart:

    • Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
    • AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
    • Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
    • Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.


    Why Organizations Choose Seceon:

    • Cut cybersecurity costs by 60% by replacing siloed tools
    • Stop threats faster with AI-powered detection and automated response.
    • Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.

    Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.

  • SecPod Technologies, Inc.
    Booth: 145

    SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
    At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
    • Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
    • Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.

    With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.

  • SecurityScorecard
    Booth: 300

    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.

  • Security Journey
    Booth: 420

    Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely–it turns everyone in the SDLC into security champions.

    Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications.

  • Semperis
    Booth: 330

    For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.

    As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) ConferenceHIP Podcast and free identity security tools Purple Knight and Forest Druid.

  • SIM Charlotte
    Booth: TBD

    The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:

    • Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
    • Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
    • Challenging our comfort levels by exchanging ideas with peers and business counterparts.
    • Being a resource for each other, and personal networking.
  • Snyk
    Booth: 245

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • Splunk, a Cisco Company
    Booth: 335

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • SpyCloud
    Booth: 435

    SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts worldwide. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. Learn more & check your exposure at spycloud.com.

  • STIGroup
    Booth: 400

    STIG is a national leader in Cybersecurity and Managed IT Solutions, engineered to protect even the largest operations. Our strategic depth of expertise ensures that businesses, from emerging enterprises to major corporations, receive the same unyielding protection.

  • Sublime Security
    Booth: 115

    Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.

  • Sumo Logic
    Booth: 200

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Structured + Juniper Networks
    Booth: 130

    Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure and managed services. For 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology. Customers trust us to provide valuable insight throughout the process of selecting and implementing secure and scalable IT strategies, platforms, and processes that meet modern expectations and drive measurable improvements throughout the enterprise.

    Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.

    At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world needs network innovation to connect ideas and unleash our full potential. Juniper is taking a new approach to the network—one that is intelligent, agile, secure and open to any vendor and any network environment. Learn more here.

  • Tenable
    Booth: 500

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • Tevora + Swimlane
    Booth: 105

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information, visit https://www.tevora.com.com.

    At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit from the world’s first and only AI automation platform for every security function. Only Swimlane gives you the scale and flexibility to unify security teams, tools and telemetry, ensuring today’s SecOps are always a step ahead of tomorrow’s threats. For more information, visit https://swimlane.com.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Torq
    Booth: 455

    Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.

  • Trinity Cyber
    Booth: 100

    Trinity Cyber is an international cybersecurity firm that invents and operates innovative solutions to the most difficult cybersecurity challenges. The company’s products and services replace multiple market segments in the traditional cybersecurity market, with customers in over a dozen of the largest market verticals. The company’s founders, management team, and technologists are all award-winning, recognized leaders in their field—and their tech has revolutionized network security.

  • Veeam Software
    Booth: 332

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • WiCyS North Carolina Affiliate
    Booth: TBD
  • Zafran Security
    Booth: 140

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

  • Zero Networks
    Booth: 125

    Zero Networks fixes the root cause of most successful cyberattacks—overly open networks and excessive logon permissions—with a simple, fully automated platform for zero trust segmentation and remote access. Zero Networks learns and automatically restricts network and user access to what’s strictly essential, leveraging multi-factor authentication to stop attacks from spreading.

  • Abnormal AI
    Booth: 400

    Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability.

    You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection is available for Slack, Workday, ServiceNow, Zoom, and multiple other cloud applications. Abnormal is currently trusted by more than 3,200 organizations, including over 20% of the Fortune 500, as it continues to redefine how cybersecurity works in the age of AI.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Ahanu Boyle, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Ahanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.

    Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.

    Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.

  • speaker photo
    Mike Brannon, Moderator
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Justin Cary
    Program Director, Human-Centered AI, The University of North Carolina at Charlotte

    Justin Cary is Program Director for the Human-Centered AI concentration in the Office of Interdisciplinary Studies at UNC Charlotte, where he leads initiatives that combine humanities-based durable skills with foundational AI frameworks, ethics, and real-world application. He is also a Senior Lecturer in Writing, Rhetoric and Digital Studies (WRDS) and an AI Faculty Fellow with the Center for Teaching and Learning, contributing to campus-wide efforts, including the AI Accelerator team and other AI-focused teaching initiatives. His work centers on advancing responsible AI literacy, integrating ethical and critical AI practices into writing education, and preparing students to lead and solve complex problems in an AI-accelerated world.

  • speaker photo
    Eli Edelkind
    CISO & Infrastructure Services, Cava

    Eli Edelkind is a seasoned technology and cybersecurity leader with more than 20 years of experience building high-performing teams, delivering resilient technology solutions, mitigating risk, and ensuring dependable operations. He currently serves as Chief Information Security Officer and leader for Infrastructure & Technology Operations at CAVA. In this role, he leads efforts to protect the CAVA brand from cyber threats, strengthen and scale restaurant technology infrastructure, and run day-to-day technology operations—helping the company stay focused on its mission of bringing heart, health, and humanity to food.

    Before joining CAVA, Eli spent nine years in cybersecurity roles across multiple organizations, including Lowe’s, where he held positions of increasing responsibility. He also served 12 years in the U.S. Marine Corps in active and reserve capacities, gaining extensive experience in leadership and national security.

    Eli’s education includes a Bachelor of Science in Information Technology and National Security Affairs from the U.S. Naval Academy, an MBA from Keller School of Management, and a certificate in Space Systems Operations from the Naval Postgraduate School. He contributes to the broader security community as a member of the Retail & Hospitality ISAC Board of Directors and has been recognized by peers with the RH-ISAC CISO of the Year award in two consecutive years. He also serves on multiple advisory boards, providing strategic guidance in his areas of expertise.

  • speaker photo
    Kara Schlageter
    CISO, Discovery Education

    Kara is a cybersecurity executive with 20+ years of experience leading security, risk, and operations in large, highly regulated financial institutions. She’s built and scaled global teams, managed $100M+ portfolios, and led complex IAM and GRC programs that reduced risk and strengthened regulatory posture. Recently stepping into the role of CISO at Discovery Education, Kara is known for translating complex cyber challenges into practical business decisions and leading security through a human lens. Her team leadership style builds trust, strengthens culture, and helps organizations move forward securely.

  • speaker photo
    Rick Scot
    CIO/CISO, Elevate Textiles

    Rick Scot is a seasoned Information Technology leader with over 30 years of experience. He currently serves as the Global Chief Information Officer and Global Chief Information Security Officer at Elevate Textiles, following senior roles at Bank of New York and Bank of America. Throughout his career, he has led strategic security initiatives, managed international teams, collaborated with law enforcement agencies, and played a key role in global cyber exercises. He also managed 4 major data transformations that created more control and safer data practices. Rick holds 33 patents in machine learning and blockchain, contributes to academic and industry advisory boards, including UNC Charlotte and NYU, and continues to drive innovation and resilience.

  • speaker photo
    Kimberly Trapani
    Chief Security Officer, Gartner
  • speaker photo
    Marcus Britt, Moderator
    Sr. Manager, Digital Employee Experience, Under Armour

    Marcus is a strategic leader with over a decade of experience driving digital transformation and operational excellence across HR, Legal, and IT organizations. Passionate about creating inclusive environments and leveraging technology to improve business outcomes, he blends innovation with a people-first mindset. Beyond the office, Marcus is involved in mentoring youth in STEM and entrepreneurship to expand access for underrepresented communities.Marcus is a strategic leader with over a decade of experience driving digital transformation and operational excellence across HR, Legal, and IT organizations. Passionate about creating inclusive environments and leveraging technology to improve business outcomes, he blends innovation with a people-first mindset. Beyond the office, Marcus is involved in mentoring youth in STEM and entrepreneurship to expand access for underrepresented communities.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Nia F. Luckey
    Chief of Staff, Cyber and Third-Party Tech Risk Team, AT&T

    Nia Luckey is a cybersecurity executive, author, and TEDx speaker focused on helping organizations rethink how trust actually works in security. With years of experience across military service, enterprise security, and executive advisory, she works with CIOs, CISOs, and boards to turn risk conversations into practical, defensible decisions. Nia’s work emphasizes the human side of cybersecurity, where leadership, culture, and accountability matter just as much as tools and controls. At SecureWorld, she brings real-world insight, candor, and a focus on what actually works.

  • speaker photo
    Rashmi Palamadai
    Identity & Access Management, AT&T

    Rashmi Palamadai has led strategic initiatives to strengthen security and compliance within Identity & Access Management. She is committed to advancing the organization’s security posture by driving continuous improvements in identity lifecycle management, access controls, data oversight, third-party risk management, and compliance validation—helping ensure resilience against evolving cyber threats. With deep expertise in IAM governance, Rashmi partners with cross-functional teams to implement secure solutions and ensure alignment with identity and access policies.

  • speaker photo
    Rob Dalzell, Moderator
    Identity and Access Management – Risks, Issues, Controls and Governance, AT&T

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte, and enjoys connecting with others that work in Cybersecurity. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. He is an ardent believer in life-long learning. In his spare time, he can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house, and trying to keep a British sports car running.

  • speaker photo
    George Douglas
    Sr. Director, BISO, Compass Group

    Experienced Senior Director with a proven track record in the Security and Artificial Intelligence domains, particularly within the Group Purchasing Organization (GPO) space. Brings expertise in strategic planning, AI-driven analytics, cybersecurity frameworks, team leadership, and operational excellence.

  • speaker photo
    Elvis Moreland, Moderator
    BISO/CISO, ILIAS Federal Solutions (IFED), Inc.

    Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.

    Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.

  • speaker photo
    Jim Robertson
    Director, Engineering, Concentric AI

    Jim has more than 10 years of experience in the data security space and has been an Sales Engineer at Varonis, StealthBits (Netwrix), Splunk, IBM, and Bionic AI. Before that, he served in network and systems engineering roles at MSPs in the upper Midwest. His broad experience in deploying and securing systems and data has translated into thought leadership about the practical challenges in the data security posture management space.

  • speaker photo
    Dakota Brewer
    Solutions Engineer, Netwrix
  • speaker photo
    Ken Smith
    Director, Enterprise Sales Engineering - Great Lakes, Arctic Wolf

    Ken Smith is the Director of Sales Engineering – Enterprise (Great Lakes) at Arctic Wolf, with 15 years of experience spanning offensive security, sales engineering, and education. A former SIGINT operator with 5th Special Forces Group (Airborne), Ken went on to serve as a red team consultant and team lead in multiple roles. He also spent a decade developing and delivering university coursework in network and application security. Ken has presented at Thotcon, Hack Space Con, and other regional conferences, and currently serves on the Board of Directors for BSidesCLE.

  • speaker photo
    Scott Thobe
    Director of Engineering, Ping Identity

    Scott Thobe is an accomplished technical leader who excels in bridging the gap between complex technologies and tangible outcomes. He specializes in translating technical insights into actionable strategies that resonate with diverse audiences. His expertise lies in building high-performance teams and leading organizational process improvements across regions to achieve business goals.

    Scott leads the Global Sales Engineering Hub and Partner Sales Engineering teams in the Americas at Ping Identity. He enjoys working with customers, partners, and cross-functional teams to balance business needs with technology, ensuring the best outcomes for customers. Additionally, he collaborates closely to shape the direction of the alliances and channel program in support of annual growth objectives.

    His mission is to empower his team and customers with best-in-class IT security capabilities to protect critical enterprise and customer information. He is committed to driving business value through initiatives such as cloud transformation and cybersecurity best practices.

  • speaker photo
    Jack Freund, PhD, Moderator
    Head of Technology Risk, Acrisure
  • speaker photo
    Charles Hartley
    Lead Information Security Analyst, TIAA

    Charles Hartley is a lead information security analyst with TIAA. His focus is on researching and creating compelling AI/cybersecurity content. He has a master's degree in business administration and journalism, and he has 30-plus years in the high-tech industry.

  • speaker photo
    Michael Terry
    Sr. Information Security Analyst, LPL Financial

    Mike Terry is a member of LPL’ Advisor and Investor Cybersecurity Team who has been with LPL for 10+ years.   In his current role, Mike educates advisors and their investors about cybersecurity; offering them with best practices to stay safe, protect sensitive information, and avoid cyber-threats.  Before transitioning to this role, he supported advisors with a number of different initiates.  Prior to working at LPL, Mike worked in the financial services industry with companies like Capital One and Wells Fargo.  Outside of work, he enjoys spending time with his family

  • speaker photo
    Tracey Hughes
    VP, Information Security, Pathward

    Tracey Hughes is a Vice President of Information Security specializing in Identity and Access Management and Security Governance, Risk and Compliance. With over 26 years of experience, she has led enterprise IAM programs across financial services, consulting, and global technology organizations, including IBM, Deloitte, and Kudelski Security. Tracey focuses on aligning identity strategy to business outcomes, regulatory requirements, and operational reality. She holds an MBA, a master’s degree in computer science, and multiple certifications including CISSP, CCISO, CISM, PCI ISA, and PMP. Known for her practical, business-focused approach, Tracey brings real-world insight to identity leadership challenges.

  • speaker photo
    Sean Flynn
    Director, Security Strategy & Technology, Akamai

    Sean Flynn is Director of Security Strategy and Technology for Akamai Technologies. Currently he works with companies to ensure Akamai’s Security Vision aligns with and fits industry and customer needs. He also acts as a trainer for web and enterprise security for internal groups. Sean has over 16 years of IT security experience working for networking and application security vendors. Sean joined Akamai in 2012, implementing Akamai security solutions for companies. He was hands-on, helping protect customers from active attacks by state-sponsored actors, hacktivists, and cyber criminals. He has consulted some of the largest customers in Finance, Commerce, and Healthcare on Akamai solutions, implementing application, network, and enterprise security, and security best practices.

  • speaker photo
    Brandon Brevard
    Cybersecurity Consulting Manager, AccessIT Group

    A seasoned cybersecurity leader who helps organizations create and protect value through a unique perspective on cyber strategy, program development, and security technologies. With experience spanning both Risk Management and Information Technology roles, Brandon combines governance and policy expertise with deep technical knowledge across environments ranging from Fortune 500 companies to the U.S. Department of Defense. He builds and strengthens trust at all levels, from SOC analysts to executive leadership.

  • speaker photo
    Steve Cobb
    CISO, SecurityScorecard

    Affectionately known in the industry as Cyber Santa, Steve Cobb brings more than 30 years of leadership and consulting involving IT infrastructure, cybersecurity, incident response, and cyber threat intelligence. Prior to becoming the CISO for SecurityScorecard, Steve led Cybersecurity and IT Infrastructure teams at organizations like One Source, Verizon, Microsoft, RBC, PNC Bank, and Capital One. Steve serves on several CISO boards and frequently presents at conferences such as InfoSeCon, Cyber Defense Summit, Blackhat, and others. Steve attended UNC-CH but left early to start his own IT and Cyber Security consulting company, ultimately receiving his degree in Business from East Carolina University. Steve and his wife have two daughters and a son. Steve currently resides in the beautiful western mountains of North Carolina.

  • speaker photo
    Colby Hoefer
    Security Specialist, Infoblox

    Colby has worked in the tech industry for the last decade as a Cyber Threat Analyst, Professional Services Engineer, Business Development Manager, and now as a Cybersecurity Specialist with Infoblox. Prior to working in the tech industry, Colby spent a decade as a machine gunner in the U.S. Marine Corps. Colby was born in the small town of Higginsville, Missouri, and now resides with his wife of 17 years and three kids outside of Raleigh, North Carolina. He enjoys spending his downtime playing Nintendo with his kids, cooking with his wife, and ripping around on motorcycles.

  • speaker photo
    Phillip Ogle
    Sr. Solutions Engineer, Enterprise, SpyCloud

    Phillip Ogle is a Senior Solutions Engineer on SpyCloud’s Investigations Team, where he helps organizations defend against identity-based threats including account takeover, ransomware, and fraud. He works closely with security teams to operationalize breach, malware, stolen session, and phishing data to uncover hidden risk across the darknet and beyond.

    With more than 20 years of experience in cybersecurity, Phillip has held roles at Trend Micro, HP Enterprise Security, Intel, and McAfee. He brings a practitioner’s perspective and a passion for translating threat intelligence into real-world defensive action.

  • speaker photo
    Scott Dickinson, Moderator
    CISO, AnMed Health

    Scott Dickinson is passionate about Information Technology and Information Security and has more than 20 years in the fields of information security and information technology. He has worked with Federal and State governments to include FBI, DOD, Veteran Affairs, State of SC, and the private sector. He has been a CIO, a CISO, a virtual CISO, Cyber Security Division Director and a variety of positions leading up to those roles. He currently serves as the CISO at AnMed. He enjoys being exceptional as a security leader and is constantly looking for ways to improve the security posture of companies. He currently holds the CISSP and CCSP certifications.

  • speaker photo
    Matt Pour
    Director, Solution Engineering, Island

    Matthew Pour is a seasoned leader in Information Technology and Information Security, currently leading Island's North America Solutions Engineers. With decades of experience, he has successfully established ITIL practices and InfoSec programs for Fortune 500 companies and engineered solutions for complex business challenges at leading technology and cybersecurity firms. Previously, Matthew served as a Field CTO at Broadcom and held key technical leadership roles at Symantec, Blue Coat, and IBM, consistently demonstrating his strategic vision and expertise in navigating the evolving landscape of information security.

  • speaker photo
    Jim Doggett, Moderator
    CISO, Semperis

    James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.

  • speaker photo
    Jermaine Green
    Manager, CIP Monitoring, SERC Reliability Corporation

    Jermaine Green, CISA, CISSP, and a 2025 Cisco Champion, is a seasoned Cybersecurity CIP Audit Manager at SERC Reliability Corporation. In his role, Jermaine leads the CIP Audit team to ensure that power companies across the Southeastern United States maintain reliable and secure operations in compliance with critical infrastructure protection standards. With a robust background in network engineering, wireless technologies, and firewall management, he brings a wealth of expertise to safeguarding the region’s power grid. His technical acumen and commitment to operational excellence make him a vital contributor to the cybersecurity and reliability of critical infrastructure.

  • speaker photo
    Joe Tromba
    Legal Counsel, SERC Reliability Corporation

    Joseph Tromba brings almost five years of experience in the energy industry and seven years of experience as an attorney. As an Enforcement attorney, he has made significant contributions to many different projects and initiatives at SERC and the ERO Enterprise.

    With a background in business management in college then primarily intellectual property law throughout law school, Joseph started his legal career as an Associate Attorney at Glynn, Mercep, and Purcell LLP (GMP) in East Setauket, New York. During his tenure at GMP, Joseph concentrated in many different types of civil litigation. His practice areas included, but were not limited to, real property litigation, commercial litigation, personal injury litigation, construction litigation, trust litigation, restrictive covenants, product liability, breach of contract, defamation, civil forfeiture, traffic violations, real estate transactions, and the drafting and execution of wills. As outside counsel, he aided and assisted in board meetings, disciplinary hearings, and depositions. Joseph received one of the Top 100 Personal Injury Settlements, which was also one of the Top 50 Motor Vehicle Accident Settlements, in New York in the year 2019.

    Since June 2021, Joseph has been involved in SERC’s Enforcement department where he has acted as the case manager for a number of noncompliances involving different entities and including various CIP and O&P NERC Reliability Standards. He has had several other responsibilities as well, such as handling Procurement at SERC Reliability Corporation and hosting the official SERC Podcast, “What’s the Bright Idea with SERC”. Before Joseph’s time at SERC and in the energy industry, he previously published an article that provides an analysis of the Fair Use Doctrine in copyright law.

    Joseph is a staunch advocate for leaving a positive impact, believing strongly in leaving this world better than how you found it. By extension, he is dedicated to improving both SERC and the energy industry, aiming to leave a positive impact that will continue on.

  • speaker photo
    Stephen Dougherty
    Principal Investigator & CEO, Rexxfield / Dougherty Intelligence & Investigations

    Stephen is an accomplished U.S. Secret Service investigator with 9-plus years of experience leading complex cybercrime, financial fraud, and international cybercrime investigations. He is recognized for pioneering the U.S. Secret Service’s Business Email Compromise Mission Desk, resulting in the recovery of nearly $500 million in victim funds. He was awarded two U.S. Secret Service Director’s Impact Awards, 2021 U.S. Secret Service Employee of the Year Award, and two DHS Secretary’s Gold Medals of Excellence for outstanding leadership, innovation, and impact. Stephen is an experienced public speaker and instructor, having delivered more than 50 global keynotes to executives, policymakers, and law enforcement on topics including cyber-enabled financial crime, digital forensics, and public-private collaboration. He is dedicated to bridging the gap between law enforcement, government, and the private sector to combat the world’s most sophisticated digital threats through intelligence-driven investigations, rapid response, and cross-border partnerships.

  • speaker photo
    Daniel Waters
    Strategy and Transformation Leader, AccessIT Group

    Daniel is the Strategy and Transformation leader at AccessIT Group, where he leads a high-performance team to advance clients' cybersecurity ambitions through strategic problem-solving and execution.

    Professional Summary and Key Highlights:

    • Daniel grew up and began his career in Australia, before moving to the US with Deloitte with whom he spent a decade of his professional life.
    • Has served Fortune 500 through to mid market extensively - US and Global.
    • Extensive experience cross market and cross culture, NAM, LATAM, APAC, EMEA.
    • Experienced with addressing challenges involving cyber risk, geopolitical and geostrategic complexities.
    • History of driving resource conscious organizations to capability target states.
    • Currently resides in Jacksonville, Florida.

    In addition, Daniel works extensively with KKR overseeing portfolio company cybersecurity risk.

  • speaker photo
    Travis Moran
    Senior Security & Regulatory Affairs Advisor, SERC Reliability Corporation

    Travis Moran is a retired law enforcement professional with over 30 years of enforcement, security, and intelligence experience with Interpol, the U.S. Department of State and U.S. Department of Justice, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). He serves as the Senior State Government & Regulatory Affairs Advisor, for SERC Reliability Corporation. SERC is specifically responsible for the reliability and security of the electric grid across the southeastern and central regions of the United States.

  • speaker photo
    Chris Bell
    VP of Strategic Accounts, Seceon

    IT and managed security sales specialist with over fifteen years of experience. Proficient at gathering business requirements, analyzing business needs, and presenting technology strategies and solutions that align with business objectives. My main goal is to help the enterprise increase user productivity, decrease risk and control costs.

    Specialties: Cybersecurity, EDR, MDR and XDR services, Managed aiSIEM, Penetration Testing & Vulnerability Assessment, Managed IT Services, Virtualization, Data Storage and Protection, Data Center Solutions, Disaster Recovery Expertise and Network Infrastructure Solutions.

  • speaker photo
    Mike Burch
    Director of Application Security, Security Journey

    Michael is an Ex-Army Green Beret turned application security engineer. Currently, he serves as the senior enlisted Cyber Network Defender for the North Carolina National Guard. In his civilian career, he is the Director of Application Security and content team lead for Security Journey, a SaaS-based application security training platform. He leverages his security knowledge and experience as a developer to educate and challenge other developers to be a part of the security team.

  • speaker photo
    Mathew Martin, Moderator
    CISO & Privacy Officer, Western Carolina University
  • speaker photo
    Matthew Burroughs
    CISO, Novolex
  • speaker photo
    Nathanael Dick
    Director, Cybersecurity and Governance, SteelFab, Inc.

    Nathanael Dick, CISSP, MBA, is the Director of Cybersecurity and Governance at SteelFab, Inc. in Charlotte. He leads the company's cybersecurity initiatives and is passionate about leveraging compliance as a tool to enhance organizational cyber maturity. In his free time, Nathanael cohosts the Cybersecurity podcast, discussing cybersecurity topics in a frank open atmosphere.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Jackson Harrower
    Product Marketing Manager, Harmonic Security

    Jackson Harrower leads product marketing at Harmonic Security, the premier platform for enabling employees to safely leverage AI tools while protecting sensitive data. Previously, Jackson served as Chief of Staff at Riscosity, a data security provider for application-layer traffic between private clouds and data subprocessors.

  • speaker photo
    Chris Rodriguez
    Security Specialist, Splunk, a Cisco Company

    Christopher Rodriguez is a Security Specialist at Splunk, a Cisco Company, advising Telecommunications, Media, and Cloud Service Providers throughout the Americas on modernizing security operations. His work focuses on SIEM transformation and advancing unified approaches to threat detection, investigation, and response.

    He brings more than15 years of experience at a major telecommunications provider across mobility, network infrastructure, and cybersecurity. A Certified Information Systems Security Professional (CISSP) since 2020, he contributes thought leadership on digital resilience and emerging cybersecurity challenges facing enterprise organizations.

  • speaker photo
    William Curtiss, Moderator
    Global Head of IT Infrastructure & Cybersecurity, Owens Corning Glass Reinforcements
  • speaker photo
    Benjamin Agner
    SVP | Network Security & DLP Engineering, Truist
  • speaker photo
    Justyn Hornor
    CEO, I/ONX

    Justyn Hornor is a seven-time founder, five-time patent holder, and Techstars NYC alum with deep roots in artificial intelligence and advanced product development. A serial deep-tech entrepreneur, he has built and scaled multiple ventures at the intersection of AI, infrastructure, and enterprise innovation.

    As the Founder and CEO of I/ONX High Compute Processing (HPC), Justyn leads a global organization redefining how enterprises deploy and scale AI. I/ONX is a leader in flexible, heterogeneous, and secure AI infrastructure solutions—revolutionizing and accelerating high-performance computing environments while eliminating dependence on any single hardware or software provider and mitigating supply chain constraints. Under his leadership, I/ONX has pioneered a composable, hardware-agnostic ecosystem designed to unlock performance, resilience, and long-term strategic freedom for enterprise customers.

    Justyn is the principal inventor behind I/ONX’s heterogeneous compute ecosystem and holds five patents spanning advanced infrastructure and AI technologies. Throughout his career, he has led high-performing product teams across multiple industries within some of the world’s largest enterprises. He is known for bridging complex customer challenges with state-of-the-art, scalable technology solutions—translating deep technical innovation into measurable business outcomes.

    He holds a B.S. in Business Management and an M.S. in Computer Information Systems from the University of Phoenix.

  • speaker photo
    Sherri Leach
    vCISO, Cyber Centurion
  • speaker photo
    John Scrimsher
    Global CISO, Kontoor Brands

    John Scrimsher is a globally recognized cybersecurity leader with over three decades of experience shaping secure digital transformation across industries. As a seasoned Chief Information Security Officer and strategist, John has driven measurable improvements in security posture for multinational enterprises, blending deep technical insight with executive leadership to align business risk with robust cyber defenses. With a career spanning operational, strategic, and board-level roles, he has helped organizations navigate emerging threats, mature security programs, and foster resilient cultures of risk awareness.

    A trusted voice in the cybersecurity community, John speaks and writes frequently on topics including governance, risk management, security technologies, and cyber resilience. His pragmatic approach bridges the gap between complex threat landscapes and actionable, business-focused solutions; empowering leaders and practitioners alike to make better decisions in an increasingly interconnected world.

  • speaker photo
    Kevin Shulz-Wade
    Sr. Security Engineering Manager - AI Security, Lowe's Companies, Inc.
  • speaker photo
    John Opala, PhD, Moderator
    VP IT & Global CISO, Hanesbrands Inc.

    Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.

    Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.

    In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
    Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
    Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.

    Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.

  • speaker photo
    John Opala, PhD
    VP & Global CISO, HanesBrands Inc.

    Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.

    Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.

    In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
    Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
    Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.

    Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.