Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, March 17, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageAssociate Cyber Risk Analyst , Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmYour CEO just asked about AI security. Do you have an answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation. - Wednesday, March 18, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSimple Daily Habits to Strengthen Your Security PostureRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] You Are Not a CISO, You Are a 'CO IS'Focus Areas: Security Leadership; Executive Alignment; Career DevelopmentCybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
9:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
10:15 amWho Are You? A Quick Look at Identity with Regard to CybersecurityFocus Areas: Identity & Access Management (IAM); Authentication and Authorization; Zero TrustIdentity and Access Management – Risks, Issues, Controls and Governance, AT&TRegistration Level:
Conference Pass
10:15 am - 10:50 amDuring this session, we will dig into how and why access is controlled, what is the difference between authentication and authorization, is MFA and 2FA the same thing, what is RBAC, and why some people and organizations call Identity Management the “first line of defense in cybersecurity.”10:15 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 am[Panel] Bridging the Gap: The Role of the BISO in Modern CybersecurityFocus Areas: Business Information Security Officer (BISO); Executive Alignment; Security Career PathsSr. Director, BISO, Compass GroupBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Registration Level:
Open Sessions
10:15 am - 10:50 amAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.10:15 am[Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral AnalyticsFocus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access GovernanceRegistration Level:
Open Sessions
10:15 am - 10:50 amThe human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.
Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.
10:50 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
11:10 amThe Human Side of CybersecurityFocus Areas: Security Culture; Security Awareness Training; Social EngineeringSr. Information Security Analyst, LPL FinancialRegistration Level:
Conference Pass
11:10 am - 11:45 amThis session focuses on the human side of cybersecurity. It’s important because with today’s evolving threats, technology controls won’t always protect your business. Increasingly sophisticated attacks often rely on human error for success, rather than just technical flaws or vulnerabilities. Humans are the first line of defense, and by building a stronger security culture, your business can better identify social engineering tactics to reduce risk and have a staff that is more security conscious.
11:10 amFrom Identity Controls to Business Impact: Making IAM Work for LeadersFocus Areas: IAM Strategy & Business Alignment; Risk & Cost Optimization; Executive Communication & GRCVP, Information Security, PathwardRegistration Level:
Conference Pass
11:10 am - 11:45 amIdentity and Access Management is no longer just a technical control—it’s a business enabler. This session helps security and business leaders rethink IAM through the lens of outcomes, not tools. Using real-world examples from regulated environments, attendees will learn how to prioritize IAM initiatives that reduce risk, lower cost, and improve workforce experience. The talk focuses on practical decision-making, balancing security, usability, and feasibility, and avoiding common pitfalls that stall IAM programs. Attendees will walk away with a clear framework for aligning IAM investments to business priorities and communicating value to executive stakeholders.11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed ThreatsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)CISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmBEC Bang! A Business Email Compromise Table-Top ExerciseFocus Areas: Business Email Compromise (BEC); Incideent Response; Tabletop ExcercisePrincipal Investigator & CEO, Rexxfield/Dougherty Intelligence & InvestigationsRegistration Level:
Conference Pass
1:15 pm - 1:50 pmIn this interactive, table-top exercise session, the audience is divided into 2 or 3 separate groups and designated as companies or entities doing business together. A BEC incident is introduced, and the group is asked to tabletop how to remedy the BEC incident from different perspectives of financial victims, compromise victims, and affected third parties. A gamification of the participation will show which group would have the better chance at a proper recovery based on prior investigations and incidents.
1:15 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceRegistration Level:
Open Sessions
1:15 pm - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pmCreating a Resilient Compliance Culture with CMMCFocus Areas: CMMC (Cybersecurity Maturity Model Certification); Compliance and Regulatory Affairs; Security CultureDirector, Cybersecurity and Governance, SteelFab, Inc.Registration Level:
Conference Pass
2:10 pm - 2:45 pmWith the final CMMC rule now published and enforcement set to begin for new U.S. Department of War contracts, companies across the supply chain are facing a major shift in how compliance, cybersecurity, and business success intersect. In this session, we’ll explore how companies can achieve CMMC compliance; not just to meet regulations, but to build a stronger, more resilient security culture.We’ll walk through practical steps to roll out new requirements to your employees and embed security and compliance into day-to-day business operations. Whether your business is already working with defense contracts or simply wants a more robust approach to compliance and security, you’ll leave with actionable ideas you can apply now.2:10 pmInterdependency: The Emerging Operational Security Dependencies Between Data Centers and Electric Utilities.Focus Areas: Critical Infrastructure Security (CIS); Operation Technology (OT) Security; Supply Chain Risk ManagementSenior Security & Regulatory Affairs Advisor, SERC Reliability CorporationRegistration Level:
Conference Pass
2:10 pm - 2:45 pmThe critical role of data centers in sustaining global economic health and societal function has been widely acknowledged and scrutinized. Increasingly recognized as critical infrastructure, data centers operate around the clock to provide essential services. As digital infrastructure continues to advance, data centers are entering a new era shaped by artificial intelligence (AI) and high-performance computing. These facilities require uninterrupted, stable electricity from their serving utilities to maintain operational efficiency. This dependency creates a reciprocal relationship in which the reliability and security of the utility directly impact the reliability and security of the data center, and vice versa.
2:10 amYour Internal AI: Empowering Innovation While Reducing Inadvertent Insider ThreatsFocus Areas: AI Security & Governance; Insider Risk Management; Data Privacy & ComplianceSr. Director, Cyber Security, Acumatica, Inc.Registration Level:
Conference Pass
2:10 am - 2:45 pmThe explosive adoption of generative AI and large language models (LLMs) has transformed how organizations work, enabling employees at all levels to accelerate tasks, generate insights, and drive innovation. Yet this democratization of AI potentially introduces a significant and often overlooked risk: inadvertent insider threats.This presentation examines how the convenience of “unsubscribed” mainstream AI tools has dramatically increased the attack surface for data exfiltration through non-malicious insider actions. We will explore real-world consequences, regulatory implications, and the growing awareness gap that leaves even sophisticated organizations vulnerable.The core message is one of empowerment rather than restriction: organizations can and should provide their teams with the full power of state-of-the-art LLMs without compromising security. “Your Internal AI” introduces a secure, enterprise-ready alternative that enables seamless use of mainstream models while automatically safeguarding sensitive information.Through intelligent pre-processing, redaction, anonymization, and policy enforcement, sensitive data is protected before it ever leaves the organization’s control, ensuring compliance and preserving privacy.Attendees will see this solution in action through a live demonstration, illustrating how users can interact naturally with powerful LLMs in everyday business related activities, while the system transparently secures confidential content in real-time.By the end of the session, participants will understand not only the risks posed by unchecked AI usage but also how to deploy “Your Internal AI” as a strategic enabler: delivering the productivity gains of cutting-edge AI to every employee, securely and responsibly.2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] The Changing Dynamics of the Role of a CISO in the Age of AIFocus Areas: CISO Strategy; AI Governance and Ethics; Proactive Risk ManagementVP & Global CISO, HanesBrands Inc.Registration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterAs the role of CISO continues to evolve, several key trends are shaping the future responsibilities of individuals in this position and their teams:
1. There is a noticeable trend towards increased scrutiny on the decision-making processes of CISOs. Stakeholders are placing a greater emphasis on understanding and evaluating the rationale behind cybersecurity strategies and actions.
2. Ethical considerations in handling data breaches are becoming a focal point for CISOs. It is essential for CISOs to not only address breaches effectively but also to do so in an ethical manner that prioritizes the protection of individuals’ data and privacy.
3. The landscape of regulations governing CISO roles may be shifting towards more stringent requirements. CISOs may need to navigate a complex web of compliance standards and regulations to ensure the organization’s cybersecurity practices align with legal expectations.
4. Proactive cybersecurity measures are gaining importance within organizations. CISOs are expected to anticipate and mitigate potential threats before they materialize, rather than solely reacting to incidents after they occur.
5. Building a culture of transparency and accountability within CISO teams is emerging as a critical focus area. CISOs are tasked with fostering an environment where team members feel empowered to raise concerns, share information, and take ownership of cybersecurity initiatives.
Hear how CISOs and their teams can navigate the new age of cybersecurity, one that is continually evolving.3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- AccessIT GroupBooth: 300
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- Akamai TechnologiesBooth: 315
Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. With the most distributed compute platform—cloud to edge—customers can build modern apps while keeping experiences closer to users and threats farther away. Learn about Akamai’s security, compute, and delivery solutions at akamai.com.
- Black DuckBooth: TBD
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
- Canary TrapBooth: 220
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Charlotte IT ProfessionalsBooth: TBD
We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.
- Charlotte Metro ISC2Booth: TBD
The Charlotte Metro ISC2 chapter is a 501c3 non-profit organization, whose mission is to advance information security in the local communities throughout the Charlotte Metro area. We provide our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate. We are committed to engaging in public service activities and outreach to advance cybersecurity awareness in the broader community.
- Charlotte Metro ISSABooth: TBD
The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.
- Clarity SecurityBooth: 225
Clarity Security makes identity governance autonomous, intelligent, and effortless. Powered by attribute-based access control, we automate user access reviews and every aspect of identity lifecycle management—saving time, cutting cost, reducing risk, and turning IT into a business enabler.
- Concentric AIBooth: 325
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- DelineaBooth: 205
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
- Harmonic SecurityBooth: 430
Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.
Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.
- ISACA CharlotteBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
- IslandBooth: 320
What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.
- Lake Norman IT ProfessionalsBooth: TBD
Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!
- LightbeamBooth: 210
LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.
- LogicallyBooth: 120
Logically is a leading national managed security and IT solution provider that helps organizations secure and support their businesses today, solve for tomorrow, and strategize for the future with cyber-first solutions. Our team of experts, including cybersecurity, engineering, networking, and cloud specialists, collaborate with customers to implement solutions that protect their assets, reduce risk, and optimize performance, end to end. Since 1999, we have made long-term relationships, customer service excellence, and purposeful innovation guiding principles to ensure customers have a trusted advisor at their side, helping them focus on their business, not the technology behind it.
- Nudge SecurityBooth: 215
Nudge Security is a SaaS security company offering a platform to manage and secure an organization’s SaaS applications. The platform provides visibility and governance over SaaS and cloud assets, including shadow IT, and quickly discovers SaaS accounts via read-only API access. It also delivers vendor security profiles, compliance attestations, and alerts for SaaS supply chain breaches.
- OptivBooth: TBD
Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.
- Phish ClubBooth: TBD
Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.
Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!
- Ping IdentityBooth: 440
Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.
- Security JourneyBooth: 420
Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely–it turns everyone in the SDLC into security champions.
Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications.
- SemperisBooth: 330
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- SIM CharlotteBooth: TBD
The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:
- Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
- Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
- Challenging our comfort levels by exchanging ideas with peers and business counterparts.
- Being a resource for each other, and personal networking.
- Splunk, a Cisco CompanyBooth: 335
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- SpyCloudBooth: 435
SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts worldwide. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. Learn more & check your exposure at spycloud.com.
- Sumo LogicBooth: 200
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- StructuredBooth: 130
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For nearly 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
- WiCyS North Carolina AffiliateBooth: TBD
- Zafran SecurityBooth: TBD
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Ahanu Boyle, InstructorAssociate Cyber Risk Analyst , Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Rob DalzellIdentity and Access Management – Risks, Issues, Controls and Governance, AT&TRob is a cybersecurity professional with over 35 years of IT experience. He recently joined AT&T where he works in Identity Management. He previously was at Bank of America where he held multiple roles in Global Information Security. He is an active member of the Charlotte Cybersecurity community.
George DouglasSr. Director, BISO, Compass GroupExperienced Senior Director with a proven track record in the Security and Artificial Intelligence domains, particularly within the Group Purchasing Organization (GPO) space. Brings expertise in strategic planning, AI-driven analytics, cybersecurity frameworks, team leadership, and operational excellence.
Elvis Moreland, ModeratorBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.
Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.
Panel Discussion
Michael TerrySr. Information Security Analyst, LPL FinancialMike Terry is a member of LPL’ Advisor and Investor Cybersecurity Team who has been with LPL for 10+ years. In his current role, Mike educates advisors and their investors about cybersecurity; offering them with best practices to stay safe, protect sensitive information, and avoid cyber-threats. Before transitioning to this role, he supported advisors with a number of different initiates. Prior to working at LPL, Mike worked in the financial services industry with companies like Capital One and Wells Fargo. Outside of work, he enjoys spending time with his family
Tracey HughesVP, Information Security, PathwardTracey Hughes is a Vice President of Information Security specializing in Identity and Access Management and Security Governance, Risk and Compliance. With over 26 years of experience, she has led enterprise IAM programs across financial services, consulting, and global technology organizations, including IBM, Deloitte, and Kudelski Security. Tracey focuses on aligning identity strategy to business outcomes, regulatory requirements, and operational reality. She holds an MBA, a master’s degree in computer science, and multiple certifications including CISSP, CCISO, CISM, PCI ISA, and PMP. Known for her practical, business-focused approach, Tracey brings real-world insight to identity leadership challenges.
Panel Discussion
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Panel Discussion
Stephen DoughertyPrincipal Investigator & CEO, Rexxfield/Dougherty Intelligence & InvestigationsStephen is an accomplished U.S. Secret Service investigator with 9-plus years of experience leading complex cybercrime, financial fraud, and international cybercrime investigations. He is recognized for pioneering the U.S. Secret Service’s Business Email Compromise Mission Desk, resulting in the recovery of nearly $500 million in victim funds. He was awarded two U.S. Secret Service Director’s Impact Awards, 2021 U.S. Secret Service Employee of the Year Award, and two DHS Secretary’s Gold Medals of Excellence for outstanding leadership, innovation, and impact. Stephen is an experienced public speaker and instructor, having delivered more than 50 global keynotes to executives, policymakers, and law enforcement on topics including cyber-enabled financial crime, digital forensics, and public-private collaboration. He is dedicated to bridging the gap between law enforcement, government, and the private sector to combat the world’s most sophisticated digital threats through intelligence-driven investigations, rapid response, and cross-border partnerships.
Panel Discussion
Nathanael DickDirector, Cybersecurity and Governance, SteelFab, Inc.Nathanael Dick, CISSP, MBA, is the Director of Cybersecurity and Governance at SteelFab, Inc. in Charlotte. He leads the company's cybersecurity initiatives and is passionate about leveraging compliance as a tool to enhance organizational cyber maturity. In his free time, Nathanael cohosts the Cybersecurity podcast, discussing cybersecurity topics in a frank open atmosphere.
Travis MoranSenior Security & Regulatory Affairs Advisor, SERC Reliability CorporationTravis Moran is a retired law enforcement professional with over 30 years of enforcement, security, and intelligence experience with Interpol, the U.S. Department of State and U.S. Department of Justice, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). He serves as the Senior State Government & Regulatory Affairs Advisor, for SERC Reliability Corporation. SERC is specifically responsible for the reliability and security of the electric grid across the southeastern and central regions of the United States.
Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
Panel Discussion
John Opala, PhDVP & Global CISO, HanesBrands Inc.Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.
Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.
In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.













