googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 20, 2025
    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, May 21, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    CISO Confidential: What's Really Keeping Us up at Night?
    speaker photo
    CISO, Cushman & Wakefield
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This invitation-only, peer-to-peer discussion tackles what’s top of mind for CISOs. Come ready to share on these topics, among others:

    1. What are topics your board/leadership care about today?
    2. Vendors: We are all getting calls but who is or is not adding value for you?

    Join the discussion, enjoy the camaraderie, and get ready for the conference day.

    8:00 am
    WiCyS Chicago Affiliate Meeting (open to all attendees)
    • session level icon
    speaker photo
    Executive Director, Women in CyberSecurity (WiCyS)
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Come meet your local Women in CyberSecurity (WiCyS) affiliate board, as well as WiCyS Executive Director Lynn Dohm. Learn more about the group, say hello, and find out about programs WiCyS has to promote growth of women in the profession.

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Securing the Windy City and Beyond: Lessons in Leadership from Top CISOs
    • session level icon
    speaker photo
    CISO, City of Chicago
    speaker photo
    CISO, National General
    speaker photo
    Chief Security Officer, Robinhood Markets
    speaker photo
    CISO, Cushman & Wakefield
    speaker photo
    Executive Director, Women in CyberSecurity (WiCyS)
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Chicago and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.

    This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 9th edition of SecureWorld Chicago.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    speaker photo
    VP, Chief Information Security & Privacy Officer, University of Chicago Medicine
    speaker photo
    Information Security Officer, IMC Trading
    speaker photo
    Global CISO, Ingredion Incorporated
    speaker photo
    Head of Security & Compliance, KinderCare Education LLC
    speaker photo
    CISO & CPO, University of Illinois at Chicago
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    10:15 am
    Human Firewalls: Training Users to Be the First Line of Cyber Defense
    • session level icon
    speaker photo
    Director of IT – GRC, Clarios
    speaker photo
    VP, Global CISO, Clairos
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Despite the rise of AI-driven attacks and advanced phishing techniques, one of the most effective lines of defense remains the human at the keyboard. In this session, cybersecurity leaders will learn how to build a security-aware culture that transforms employees into strong “human firewalls.” Come ready to hear about:

    • Measuring effectiveness beyond checkbox compliance (Carrots & Sticks)
    • Designing impactful, role-specific security awareness training
    • Combating fatigue and complacency in phishing simulations
    • Deep Fakes

    Come ready to learn what’s working, what’s not, and how to empower users to recognize and block sophisticated threats before they reach your defenses.

     

    10:15 am
    Accelerate Engineering Adoption of Your Cyber Goals with Next-Generation Strategies
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Learn about next-generation engineering enablement strategies that leverage automation, engineering outreach methods and engineering-focused resources to accelerate engineering adoption of your priority cyber initiatives. These strategies will help you kickstart programs that increase adoption from engineering teams while leveraging the tools and environments that engineers use.

    10:15 am
    The Evolution of SaaS Security: From Breaches to Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    As SaaS adoption accelerates, so do the risks—31% of organizations have already faced a SaaS-related data breach. This session explores emerging SaaS security threats, common misconfigurations, and evolving attacker tactics. By leveraging AppOmni’s insights, we’ll cover proactive threat detection and risk mitigation strategies to help you safeguard critical data and maintain business resilience in today’s dynamic threat landscape.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Privacy for Security Professionals: Protecting Data in a Time of Uncertainty
    • session level icon
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Session details to come.

    11:10 am
    The Impact of AI on Cybersecurity Roles, Retention, and Culture
    • session level icon
    speaker photo
    CMO, Peterson Technology Partners
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Unlock insights into the evolving landscape of talent deployment and retention as board expectations drive CIOs and CISOs to rethink traditional IT talent models. Explore the impact of GenAI on coding processes and the software engineering lifecycle and discover strategies for optimizing talent allocation and headcounts. Gain actionable insights into defining new roles, cultivating essential skills, and charting GenAI-centric career paths to align with organizational goals and stay ahead in a rapidly changing technological landscape.

    11:10 am
    Leadership Under Pressure: The Hidden Costs and Opportunities in Cybersecurity Stress
    • session level icon
    speaker photo
    Co-Founder & CEO, Green Shoe Consulting
    Registration Level:
    • session level iconVIP / Exclusive
    11:10 am - 11:55 am
    Location / Room: Room 30
    Today’s cybersecurity leaders face relentless pressures: expanding attack surfaces, resource limitations, 24/7 availability expectations, and the personal weight of business risk. Our latest research at Green Shoe Consulting reveals two common CISO leadership profiles—the Reactor and the Advisor—each with distinct patterns impacting personal wellbeing and leadership effectiveness.
    This session, open to Advisory Council members, invited VIPs, and CISO of the Year members, introduces a high-performance stress management framework based on the ARENA resilience training program, adapted for the cybersecurity world. Attendees will learn how to recognize early signs of burnout, apply core resilience skills, and start building a personal strategy for sustainable leadership under pressure. Takeaways:

    1. Identify your current leadership stress profile.
    2. Recognize how chronic distress impacts decision-making and workplace performance.
    3. Learn practical, science-backed skills to regulate stress in real-time.
    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Field CTO, Sumo Logic
    speaker photo
    Product Security Specialist, Infoblox
    speaker photo
    Sr. Solutions Architect, US, Bitdefender
    speaker photo
    Sr. Research Engineer, Permiso
    speaker photo
    Product Manager, Cloud Storage Security
    speaker photo
    SVP, CISO , AdaptHealth
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Building Your Stress Management Playbook: A Resilience Workshop for Cybersecurity Leaders
    speaker photo
    Co-Founder & CEO, Green Shoe Consulting
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Awareness without action is not resilience. This interactive working session for Advisory Council members, invited VIPs, and CISO of the Year members will guide cybersecurity leaders through designing a practical, personal stress management plan they can immediately apply. Using insights from resilience science and Green Shoe Consulting’s CISO wellbeing research, participants will translate new knowledge into customized strategies to recognize stress triggers, respond intentionally, and recover effectively.

    Each attendee will leave with a completed Personal Stress Management Worksheet and a 30-Day Resilience Challenge Card—a compact, actionable plan to strengthen leadership clarity, energy, and decision-making even under intense pressure. Takeaways:

    1. Map your top stress triggers and early warning signs.
    2. Choose resilience skills tailored to your leadership style.
    3. Create a simple 30-day personal resilience plan to implement immediately.
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Tabletop Exercises in Your Pocket
    • session level icon
    speaker photo
    CISO, DeVry University
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Participate in the play-through of an interactive tabletop exercise, and learn how to identify, protect, respond, and recover from cyberattacks while creating a more cyber-aware culture. During the exercise, participants will be asked to assume a role in an organization impacted by a simulated cyberattack and discuss cyber incident response actions. Attendees will be given access to virtual resources so they can facilitate simple tabletop exercises within their own organizations.

    1:15 pm
    Benchmarking Your Cybersecurity Framework
    • session level icon
    speaker photo
    Cybersecurity & Privacy Executive | Associate C-CISO | Boardroom Certified QTE
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    In today’s interconnected digital landscape, organizations face evolving cybersecurity threats that demand robust and adaptable defenses. To ensure optimal security and resilience, it’s crucial to evaluate and measure your cybersecurity framework not just in isolation but in comparison to industry peers and beyond. Benchmarking provides a valuable lens to identify strengths, uncover vulnerabilities, and adopt best practices.

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Technical Director, Security & AI Strategy, Darktrace
    speaker photo
    Co-Founder & CEO, Dune Security
    speaker photo
    VP of ML Threat Operations, HiddenLayer
    speaker photo
    Principal Cybersecurity Architect, Cummins Inc.
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    The World's First AI Certification, ISO 42001: What We've Learned After One Year
    • session level icon
    speaker photo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    In 2024, Schellman became one of the first accredited certification bodies for ISO 42001, providing invaluable insights into AI governance. Our experience revealed that ISO 42001 equips organizations with a robust framework to navigate the complex landscape of AI regulation. By establishing clear guidelines for ethical AI practices, organizations can enhance transparency, accountability, and compliance. This standard not only helps mitigate risks associated with AI deployment but also fosters trust among stakeholders. We believe that ISO 42001 is essential for organizations striving to balance innovation with regulatory demands, ultimately paving the way for responsible AI adoption in diverse sectors.

    2:10 pm
    [Panel] Cybersecurity Challenges for Small and Medium Businesses
    • session level icon
    speaker photo
    Director of Security, CTC Trading Group LLC (Retired)
    speaker photo
    Security & Infrastructure Manager, Anning-Johnson Company
    speaker photo
    Sr. Strategic Advisor & vCISO, Sentinel Technologies
    speaker photo
    President & CEO, Malcom Risk Advisors
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Small and medium businesses (SMBs) are the backbone of the U.S. economy, generating over half of the annual GDP and employing millions of Americans. But they also face unique cybersecurity challenges that can threaten their survival and growth. In this discussion, learn how to assess and mitigate the cyber risks that SMBs face, and how to implement a robust cybersecurity program with limited resources and expertise. We cover the following topics:

    • The state of SMB cybersecurity in the U.S.
    • The cost and impact of cyber breaches on SMBs
    • The main cyber threats and vulnerabilities that SMBs face
    • The best practices and frameworks for SMB cybersecurity
    • The steps to build or improve your cybersecurity program

    Whether you are an IT manager, a cybersecurity professional, or a business owner, this talk is informative and practical. Walk away with a better understanding of the cyber landscape and the tools and techniques to protect your SMB from cyberattacks.

     

    2:10 pm
    Navigating Third-Party Risk and Vendor Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    In today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.

    To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.

    2:55 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:55 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:15 pm
    [Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    speaker photo
    CISO & VP, IT Operations, Thrivent Financial
    speaker photo
    Venture Advisor, YL Ventures
    speaker photo
    CISO, Zebra Technologies
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    Ever wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.

    Expect candid insights on topics like:

    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners

    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.

    4:00 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • AppOmni
    Booth: 190

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Bitdefender
    Booth: 200

    Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert* for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.  ​

  • Black Duck
    Booth: 320

    Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.

  • Chicagoland Cybersecurity Exchange
    Booth: TBD

    Chicagoland Cybersecurity Exchange aims to bring together the Chicagoland cybersecurity community as a hub for thought-provoking discussions, hands-on demos and walk-throughs, memorable gatherings, peer networking, and career opportunities.

    Comprised of 1,900+ passionate security thinkers, tinkerers, inventors, engineers, architects, analysis, advisors, entrepreneurs and executives, our members are the cybersecurity backbone of Chicagoland and the organizations that call it home.

  • CISO of the Year
    Booth: TBD

    The current business climate has seen an unprecedented number of cybersecurity related headlines. Hackers to Nation State actors have been shown to be constantly probing Organizations defenses with the intent to break in, disrupt operations, monetize information, and steal intellectual property. Between these threats and the increasing regulatory climate, never has the Chief Information Security Officer (CISO) been asked to navigate more difficult terrain.

    Originally patterned after the Chief Information Officer (CIO) of the Year Award sponsored by the Association of Information Technology Professionals (AITP Chicago), SIM-Chicago and the Executive Club of Chicago, this program seeks to recognize outstanding CISOs for the contributions they make to their organizations, the Information Security profession and the local community. The award process is overseen by the Chicago CISO of the Year Program, which is a not-for-profit affiliated with AITP Chicago and managed by local area security leader volunteers.

  • Cloud Storage Security
    Booth: 170

    Cloud Storage Security is a leader in cloud and on-premises data protection, enabling businesses to operate securely and efficiently. Built with a singular focus on securing the world’s data, our advanced malware detection and data loss prevention solutions help organizations eliminate threats, reduce risk, and ensure compliance.

    Trusted by commercial enterprises, regulated industries, and public sector organizations worldwide, Cloud Storage Security is reshaping the way businesses safeguard their data. Our commitment to security is backed by industry-leading certifications, including SOC 2 Type II, and recognition as an AWS Public Sector Partner with an AWS Qualified Software offering, AWS Security Competency, and AWS Authority to Operate.

  • Darktrace
    Booth: 220

    Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.

  • Dune Security
    Booth: 380

    Dune Security is the world’s first and best User Adaptive Risk Management solution.

    Powered by AI, we automatically deliver User Adaptive Testing and User Adaptive Training to quantify employee risk with comprehensive data from any connected source. For higher-risk users, our platform integrates seamlessly with the broader security stack todynamically adapt security and protect areas of weakness.
    Backed by Toba Capital, Craft Ventures, Mass Mutual Ventures, Alumni Ventures, Firestreak Ventures, and Antler, we empower CISOs to proactively manage human risk—the leading cause of cybersecurity breaches—and build safer, more resilient organizations.

  • HiddenLayer
    Booth: 340

    HiddenLayer is the leading provider of Security for AI. Its security platform helps enterprises safeguard the machine learning models behind their most important products. HiddenLayer is the only company to offer turnkey security for AI that does not add unnecessary complexity to models and does not require access to raw data and algorithms. Founded by a team with deep roots in security and ML, HiddenLayer aims to protect enterprise’s AI from inference, bypass, extraction attacks, and model theft. The company is backed by a group of strategic investors, including M12, Microsoft’s Venture Fund, Moore Strategic Ventures, Booz Allen Ventures, IBM Ventures, and Capital One Ventures.

  • HUMAN Security
    Booth: 310

    HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.

  • Infoblox
    Booth: 100

    Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.

  • InfraGard Chicago
    Booth: TBD

    All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.

    The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.

  • ISACA Chicago Chapter
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.

    Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)

    Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.

  • ISSA Chicago Chapter
    Booth: TBD

    The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.

  • Keeper
    Booth: 230

    Manage, protect and monitor all your organization’s passwords, secrets and remote connections with zero-trust security.

  • Permiso Security
    Booth: 350

    Permiso Security provides comprehensive identity protection and detection for human and non-human identity threats at all stages of the identity lifecycle, across all environments. The company is backed by Altimeter Capital, Point72, Foundation Capital, Work-Bench, 11.2 Capital and Rain Capital.

  • Rapid7
    Booth: 210

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Robert Half
    Booth: 330

    Robert Half, the world’s first and largest specialized talent solutions firm, connects opportunities at great companies with highly skilled job seekers. We offer contract, temporary and permanent placement solutions for roles in finance and accounting, technology, marketing and creative, legal, and administrative and customer support. Named to Fortune’s World’s Most Admired Companies and 100 Best Companies to Work For® lists and a Forbes Best Employer for Diversity, Robert Half is the parent company of Protiviti®. Robert Half is traded on the New York Stock Exchange (symbol: RHI) and is a member of the S&P 500 index.

  • Silverfort
    Booth: 360

    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.

  • Sumo Logic
    Booth: 240

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Tevora + ProcessUnity
    Booth: 180

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.

    ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.

  • ThreatLocker
    Booth: 260

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Trustmi
    Booth: 270

    Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7. Our AI-driven platform instantly detects suspicious activity and human errors by continuously analyzing millions of data points, including vendor actions, emails, files, and payment details. Trustmi helps you accelerate digital transformation by reducing manual verification efforts and enhancing the efficiency and security of your payment processes, ensuring a smarter, faster approach to fraud prevention.

  • WiCyS Chicago Affiliate
    Booth: TBD
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Erik Hart, Moderator
    CISO, Cushman & Wakefield

    Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.

    Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.

  • speaker photo
    Lynn Dohm
    Executive Director, Women in CyberSecurity (WiCyS)

    Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.

  • speaker photo
    Bruce Coffing
    CISO, City of Chicago

    Bruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank of America and was a Senior Manager at consulting firm Accenture. Mr. Coffing holds the Certified Information Systems Security Professional (CISSP) certification.

  • speaker photo
    Todd Covert
    CISO, National General

    Todd is a seasoned cybersecurity executive with over two decades of experience driving information security strategies in highly regulated environments. As Chief Information Security Officer at National General, he has spearheaded transformative initiatives and the integration of acquired organizations. With a passion for fostering proactive security cultures and driving innovation responsibly, he is committed to empowering organizations to navigate the complex cybersecurity landscape with confidence.

    A trusted advisor to senior leadership, he excels in aligning security initiatives with business objectives, ensuring compliance with regulations such as NY DFS, HIPAA, GDPR, and meeting PCI DSS requirements.
    Todd holds an MBA and multiple certifications, including CISSP, CDPSE and Associate C|CISO.

  • speaker photo
    Erika Dean
    Chief Security Officer, Robinhood Markets

    Erika Dean is Chief Security Officer of Robinhood Markets. She oversees the Security, Privacy and Corporate Engineering organizations, which include the information security and productivity functions. Erika has over 20 years of experience in the security industry. Prior to joining Robinhood, she spent over 20 years at Capital One Financial, where she held a variety of leadership positions in cybersecurity, including serving as the Chief Information Security Officer for US Card, International, and Small Business.

  • speaker photo
    Erik Hart
    CISO, Cushman & Wakefield

    Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.

    Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.

  • speaker photo
    Lynn Dohm, Moderator
    Executive Director, Women in CyberSecurity (WiCyS)

    Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.

  • speaker photo
    Karen Habercoss
    VP, Chief Information Security & Privacy Officer, University of Chicago Medicine

    Karen Habercoss is the Vice President, Chief Information Security and Privacy Officer for The University of Chicago Medicine health system. She is responsible for the enterprise strategy and operations of the health system Information Security and Privacy Office. Karen has a Master’s Degrees in Business Administration and Clinical Social Work. Prior to her current role, she worked in the Compliance Department at The Joint Commission and as the Corporate Compliance and Quality Officer for PRS, LLC. Karen holds the following certifications: CIPM, CDPSE, AIGP, CCEP, CHC, CHPC, and CHRC and maintains her licensure in clinical social work. She is the current chair of the HIMSS Cybersecurity, Privacy, and Security Committee and has been an active member of the Association of American Medical Colleges Compliance Officers’ Forum for many years where she is the chair-elect of the Steering Committee. Karen is the past co-lead the Privacy-Security Task Group for the Healthcare and Public Health Sector Coordinating Council Cybersecurity Working Group. She speaks regularly on the topic of Privacy-Security collaboration strategies to reduce enterprise risk.

  • speaker photo
    Jatin Mannepalli
    Information Security Officer, IMC Trading

    Jatin Mannepalli, CISSP, CCSP, is an Information Security Officer (ISO) at IMC Trading, with more than 10 years of experience in the InfoSec field. He has led information security and risk management teams, and worked as a security consultant for major firms like McKinsey & Company. Jatin specializes in security governance, risk management, and creating customer-centric, technology-driven security strategies. His approach focuses on aligning security with organizational goals, and he is recognized as a top voice in Information Security on LinkedIn. He has published articles in Dark Reading, contributes to cybersecurity by developing ISC2 exams, and volunteers to raise security awareness in local communities.

  • speaker photo
    Kenneth Townsend
    Global CISO, Ingredion Incorporated

    Kenneth Townsend is a proven results-oriented CISO with a successful track record of delivering business value by leveraging technology and leading transformational cybersecurity strategies. Kenneth’s understanding of the digital technology stack across the enterprise and cyber risk management has allowed him to successfully operate in a variety of industries and become a highly respected leader in Financial Services, Retail, Healthcare, and Manufacturing.

    As the Global CISO for Ingredion, Kenneth is responsible for establishing and executing a cyber strategy to manage risk across the corporate and manufacturing environments. He brings a deep understanding of cybersecurity threats, regulations, and best practices to the role to build a strong security culture. Beyond his core responsibilities, Kenneth is a dedicated thought leader in the cybersecurity community. He is a cyber product advisor, active speaker at various industry events, and volunteers time to support and mentor youth in STEM fields.

  • speaker photo
    Sean Ventura
    Head of Security & Compliance, KinderCare Education LLC

    Sean has over three decades of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Head of Information Security and Compliance at KinderCare, one of the nation’s largest accredited early learning education systems, implementing and maintaining the company’s security and compliance Prior to KinderCare, Sean Served as the Chief Information Security Officer, at Atmosera, providing security and compliance expert advisory to Atmosera’s clientele. He brings extensive experience in lean team management within infrastructure and security business units, providing a reliable and secure environment across a wide range of regulatory and legal frameworks. Sean has held progressively more senior roles with ESCO one the world’s largest steel manufacturer of ground engagement equipment, Gogo Air, providing security advisory and design for all the commercial wireless services, DDB/Omnicom, a worldwide marketing communications firm, as well as financial institutions, and national retail chains.

  • speaker photo
    Shefali Mookencherry, Moderator
    CISO & CPO, University of Illinois at Chicago

    Shefali is a seasoned professional with expertise in information security, privacy, higher education, HIPAA, research, healthcare policy and strategy, promoting Interoperability (PI), and compliance. With 20+ years of cybersecurity, privacy, and higher education experience—including 30+ years of healthcare experience. She is acknowledged as a cybersecurity and privacy subject matter expert (SME) and highly sought after for thought leadership opportunities. Shefali also has a keen interest in the adoption of innovative technology and provides leadership, consultation, coordination, and integration of information processes with enterprise-wide information technology and information security and privacy strategies.

  • speaker photo
    Annie Forrer
    Director of IT – GRC, Clarios
  • speaker photo
    Prasanna Ramakrishnan
    VP, Global CISO, Clairos
  • speaker photo
    AppOmni Representative
  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    George Wang
    CMO, Peterson Technology Partners

    George is a business technology leader with over 30 years’ experience in startup, mid-sized and Fortune 500 firms. As the Chief Marketing Officer at PTP, George is responsible for strategic growth, client relationships, and new business development. George was also a former CIO and COO with industry experiences in seven different verticals.

    George has a BS in Computer Engineering from the University of Illinois Urbana-Champaign and a MS in Engineering Management from National Technological University. In addition to his work with PTP, George also serves on the board of SIM Chicago and volunteers for various non-profits, including I.C.Stars, Northeastern Illinois University Advisory Board, and Teen Innovators Board.

  • speaker photo
    Steve Shelton, Moderator
    Co-Founder & CEO, Green Shoe Consulting

    Steve Shelton founded Green Shoe Consulting with a singular mission: to alleviate the suffering caused by chronic distress and burnout in the cybersecurity industry. Having spent nearly 20 years on the front lines of cybersecurity sales with companies like CDW, Symantec, RSA, Proofpoint, and Check Point, Steve witnessed firsthand the relentless stress, high stakes, and emotional toll that security professionals endure daily. He saw talented leaders and teams struggle under the weight of constant crisis response, organizational pressure, and the personal cost of burnout—and he knew something had to change.

    Drawing from his expertise as a cognitive performance professional, Steve now applies evidence-based mental skills training to help CISOs and cybersecurity teams thrive under pressure, make better decisions in crisis, and sustain long-term performance without sacrificing well-being. His work bridges the gap between cybersecurity’s unique demands and the science of resilience, offering practical, high-impact strategies to leaders and teams navigating one of the most stressful industries in the world.

    Through Green Shoe Consulting, Steve is leading a new movement in cybersecurity—one where resilience is a strategic advantage, burnout is preventable, and professionals no longer have to choose between success and their own mental health.

  • speaker photo
    Brandon Borodach
    Field CTO, Sumo Logic

    Brandon K. Borodach is a cybersecurity thought leader and Field CTO at Sumo Logic, specializing in SIEM evolution, detection engineering, and cloud security. With deep expertise in security analytics, AI-driven threat detection, and multi-platform SIEM strategies, he has helped organizations modernize their security operations. Brandon has led security engineering and pre-sales teams at Sumo Logic and Anvilogic, pioneering detection-as-code methodologies and scalable security architectures across cloud-native and hybrid environments.

    Holding a Master of Science in Cybersecurity with a concentration in Information Assurance, Brandon combines technical depth with strategic vision to drive cybersecurity innovation. He is passionate about enabling organizations to enhance their security posture in an ever-evolving threat landscape.

  • speaker photo
    Colby Hoefer
    Product Security Specialist, Infoblox
  • speaker photo
    Andrei Ionescu
    Sr. Solutions Architect, US, Bitdefender

    Andrei has been in cybersecurity for 20 years; the last 13 he has been working for Bitdefender. In his day to day role, he helps enterprises to adopt Bitdefender inside their security stack while ensuring a smooth transition to our tools and services.

  • speaker photo
    Andrew Kraut
    Sr. Research Engineer, Permiso

    Born with a screwdriver in his hand, Andy has been digging into the internals of technology since he opened his eyes and in the security industry since the era of dial-up. Proudly a generalist, Andy has turned his hand at a wide swath of security industry focuses on both the offensive and defensive sides over the last 25 years. When he’s not breaking systems and questioning assumptions, you can find him suspiciously connecting his laptop to things, pushing buttons that say “Do not press,” biking mountains, and climbing rocks.

  • speaker photo
    Connor Surkau-Parkinson
    Product Manager, Cloud Storage Security

    Connor Surkau-Parkinson is a Product Manager at Cloud Storage Security, where he collaborates with a skilled team to develop innovative security solutions for organizations that store, ingest, and transmit data in the cloud. During his time at CSS, Connor has played a key role in delivering major enhancements across multiple initiatives — including deepening AWS integrations, refining scanning capabilities, and broadening support for various storage types. His technical expertise and strategic insight have been instrumental in driving impactful product improvements that align with the evolving cybersecurity landscape.

  • speaker photo
    Michael Myint, Moderator
    SVP, CISO , AdaptHealth

    A transformational leader with nearly thirty years of experience in information security and technology delivering business resilience to defend against the latest threats. Strategic, tactical, and a true hands-on practitioner… a business aligned pragmatic builder with over ten years of experience leading the information security program across four companies: two Fortune500’s, and two start-up organizations. Service oriented, began his career as a consultant (Accenture, Cap Gemini Ernst & Young, Deloitte) building security capabilities for clients in Healthcare, Financial Services, and Manufacturing. Having led teams as small as five and as large as two hundred with budgets ranging from seven to eight figures. Delivering cohesiveness and optimal performance from his teams while developing future leaders; CEO, CIO, CISO, VP InfoSec, etc.

    He has revamped existing information security programs to expand capabilities and defend against the latest threats, as well as built programs from the ground up at high-growth organizations. He has been instrumental in building information security capabilities focused on compliance, security operations, and product development.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Steve Shelton, Moderator
    Co-Founder & CEO, Green Shoe Consulting

    Steve Shelton founded Green Shoe Consulting with a singular mission: to alleviate the suffering caused by chronic distress and burnout in the cybersecurity industry. Having spent nearly 20 years on the front lines of cybersecurity sales with companies like CDW, Symantec, RSA, Proofpoint, and Check Point, Steve witnessed firsthand the relentless stress, high stakes, and emotional toll that security professionals endure daily. He saw talented leaders and teams struggle under the weight of constant crisis response, organizational pressure, and the personal cost of burnout—and he knew something had to change.

    Drawing from his expertise as a cognitive performance professional, Steve now applies evidence-based mental skills training to help CISOs and cybersecurity teams thrive under pressure, make better decisions in crisis, and sustain long-term performance without sacrificing well-being. His work bridges the gap between cybersecurity’s unique demands and the science of resilience, offering practical, high-impact strategies to leaders and teams navigating one of the most stressful industries in the world.

    Through Green Shoe Consulting, Steve is leading a new movement in cybersecurity—one where resilience is a strategic advantage, burnout is preventable, and professionals no longer have to choose between success and their own mental health.

  • speaker photo
    Dr. Fred Kwong
    CISO, DeVry University

    Dr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security Officer. He is a member of several advisory boards and is a frequent speaker at national security forums on cyber security and information technology and is often asked to consult on matters of security and leadership

    Fred also serves as an adjunct faculty member at Roosevelt and Benedictine Universities. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his Doctorate in organization development from Benedictine University. Fred has earned several certifications including the CISSP, CISA, CISM, CDPE, PCIP, PMP and ITILv3f.

  • speaker photo
    Stella Danso, CISM, CRISC, CDPSE
    Cybersecurity & Privacy Executive | Associate C-CISO | Boardroom Certified QTE

    Stella is a distinguished risk management executive with a proven track record of transforming global organizations to drive meaningful risk reduction, optimize operational costs, and enable sustainable growth in an increasingly data-driven world. With deep expertise in aligning business strategy with technology, security, and privacy, she ensures organizations achieve legal and regulatory excellence while fostering innovation.
    Stella’s career spans diverse industries, including e-commerce, retail, quick service restaurants, consumer packaged goods (CPG), telecommunications, insurance, and investments. She has contributed to the success of iconic global brands such as Optus Communications and Siemens in Australia, as well as 3Com, Allstate, Kellogg’s, McDonald’s, and most recently, Expedia Group in the United States.

    An expert in designing and implementing enterprise-scale information security and business transformation programs, Stella consistently drives initiatives that enhance organizational resilience, boost business performance, and develop top-tier talent. Her efforts have established her as a leader in crafting strategies that unify security, privacy, and governance.

    Stella is highly adept at leading global, strategic security and privacy initiatives, leveraging internationally recognized frameworks such as ISO 27001 and NIST. She champions privacy-by-design principles and AI risk management frameworks, leveraging industry best practices to deliver operational excellence, drive standardization, and orchestrate seamless business outcomes. Her ability to bridge technical expertise with strategic vision has made her an invaluable asset to the organizations she serves.

  • speaker photo
    Dr. Margaret Cunningham
    Technical Director, Security & AI Strategy, Darktrace
  • speaker photo
    Dave DellaPelle
    Co-Founder & CEO, Dune Security

    David DellaPelle is the Co-Founder and CEO of Dune Security. With a visionary yet pragmatic approach, he leads Dune in tackling one of today's most pressing enterprise challenges: employee-based cyber risks. David holds a BS in Economics and Management from Cornell University and an MBA from NYU, where he received the prestigious Andre Koo Tech Scholarship. He drove security product innovation and revenue growth at leading cybersecurity and AI companies, including Perimeter 81, At-Bay, and Waycare, following an early career in management consulting at EY.

  • speaker photo
    Travis Smith
    VP of ML Threat Operations, HiddenLayer

    Travis Smith is the Vice President of ML Threat Operations at HiddenLayer where he is responsible for the services offered by the organization, including red-teaming machine learning systems and teaching adversarial machine learning courses. He has spent the last 20 years building enterprise security products and leading world class security research teams. Travis has presented his original research at information security conferences around the world including Black Hat, RSA Conference, SecTor, and DEF CON Villages.

  • speaker photo
    Sankarasubramaniam Chockalingam, Moderator
    Principal Cybersecurity Architect, Cummins Inc.
  • speaker photo
    Danny Manimbo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman

    Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)

  • speaker photo
    Walter Lefmann
    Director of Security, CTC Trading Group LLC (Retired)

    Walter Lefmann is recently retired from Director of Security at CTC Trading Group LLC, a capital markets trading firm. That role has included Information Security, Physical Security and Life Safety, Privacy, and BCP/DR.
    He has been practicing cybersecurity with varying focus for his entire professional career. The balance has shifted back and forth over time between technology engineering/operations and security over the years, which has led to a well-balanced business-focused approach to security.

    The professional journey to CTC came by way Goldman Sachs, Hull Trading Company, and Motorola; from an early career as an experimental physicist at the Fermi National Accelerator Laboratory. Walter holds a PhD, MPhil, and MA in Physics from Columbia University, and a BS in Physics from Stevens Institute of Technology. While at Columbia University, Walter also served for five years as a volunteer NYC Auxiliary Police Officer and Sergeant. The experience of working closely with the public sector to serve and improve the community was tremendously rewarding, and has shaped a lifelong respect for the dedicated people who face the challenges of that service!

    Walter in retirement is focused on giving back to the community via professional and public/private outreach organizations, including FBI InfraGard (currently serving as a Chicago Chapter Board Chair), Chicago FIRST (Board Officer), US Secret Service Cyber Fraud Task Force, FS-ISAC, the National Technology Security Coalition, and ASIS, and is one of the founders of the ChiBrrCon security conference and recently volunteering with Docent.org and the CornCon conference.

    Walter received the Infragard North Central Region “Meeting the Challenge” award for 2022, and the 2022 “Chicago CISO of the Year” award in the MIDCAP category. Outside of work, Walter is an avid scuba diver (even diving in Lake Michigan… yes, it’s COLD!), sings tenor in the Harper Festival Chorus community group, and dances with his wife whenever he can.

  • speaker photo
    Trent Ridgway
    Security & Infrastructure Manager, Anning-Johnson Company
  • speaker photo
    Arvin Verma
    Sr. Strategic Advisor & vCISO, Sentinel Technologies

    Arvin Verma is a highly motivated cybersecurity professional, with over 14 years of experience across a multitude of cyber and IT domains. He has worked in multiple industries spanning over 5 Fortune 500 companies and Big 4 consulting. He is currently a vCISO within the SMB segment.
    In addition, Arvin proudly served in the US Navy Reserves as a Cryptologic Warfare Officer. He also serves as a research fellow with the Cybersecurity Forum Initiative where he has co-authored several research papers in new cyber trends and best practices.
    Arvin holds several leadership positions with InfraGard Chicago and InfraGard National. He currently serves as the National Sector Chief for the Information Technology Sector, National Sector Security and Resilience Program of InfraGard National.

    He also serves as an advisor to several private and public entities, several startup organizations and is a guest lecturer at several universities across the State of Illinois.
    Arvin is ISC2 CISSP certified, CompTIA Security+ certified, ISO 27001 Lead Auditor certified and a CMMC Registered Practitioner.

  • speaker photo
    Dave Malcom, Moderator
    President & CEO, Malcom Risk Advisors

    David Malcom is a creative thought leader with over 24 years of experience in cybersecurity, internal audit, data analytics, and risk consulting. David launched Malcom Risk Advisors in July 2024 with a mission to ensure that all small and medium sized businesses could gain access to a cybersecurity executives, at a cost that fits their budget. Prior to launching Malcom Risk Advisors, David held multiple executive leadership positions at global organizations, including Chief Audit Executive at Groupon, Managing Director of Internal Audit at The Northern Trust Company, Global IT Audit and Data Analytics Leader at Accenture, and Chief Information Security Officer at Hyatt Hotels Corporation. Recognized as the 2023 Auditor of the Year by the Institute of Internal Auditors (Chicago Chapter), David has transformed high-performing, global teams through the implementation of data-driven strategies that enhance control testing, quantify risk assessment processes, and create continuous auditing capabilities that increases the assurance of the operating effectiveness of controls in real-time.

    David has also consulted with multiple venture capital and private equity organizations to increase their awareness and understanding of cyber security risks related to emerging technologies (e.g., artificial intelligence) and data protection as part of completing their due diligence activities. David holds a Bachelor of Arts in Accounting from Illinois Wesleyan University and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).

    In addition to leading Malcom Risk Advisors, David is also a pastoral resident at Renewal Church of Chicago and is pursuing his Master’s in Biblical Preaching at Moody Bible Institute. Outside of work, David leads an active lifestyle and is proficient in multiple martial arts.

  • speaker photo
    Mary Elizabeth Faulkner
    CISO & VP, IT Operations, Thrivent Financial

    Mary Elizabeth Faulkner serves as VP, Chief Information Security Officer (CISO) and VP of IT Operations for Thrivent , its subsidiaries and affiliates. This role reports directly to the Chief Digital, Data & Technology Officer.

    As the CISO and head of IT Operations, Mary Elizabeth is responsible for leading teams that execute the Fortune 500 diversified financial service organization’s information security strategy; provide management and oversight; support cyber defense engineering, identity and access management engineering and operations; incident response; information risk management and assurance services; technology service centers; fulfillment; IT incident response; and operations centers.

    Mary Elizabeth has over 25 years of experience in information security, litigation advisory services, and audit. She has served in security advisory roles for a number of industries, including technology, insurance, retail, gaming, government, automotive and manufacturing. She has led global IT organizations driving maturity in information security, network and security operations.. Her experience spans across many domains of information security strategy, information risk management, cyber defense operations, cyber defense engineering, identity and access management, IT general controls, incident response, and forensic investigations.

    Mary Elizabeth received a master’s in technology management from Georgetown University. She holds CRISC and CDPSE certifications. Mary Elizabeth is a Board of Director member for the FAIR Institute.

  • speaker photo
    Jay Gonzales
    Venture Advisor, YL Ventures
  • speaker photo
    Mike Zachman, Moderator
    CISO, Zebra Technologies
  • speaker photo
    Happy Hour
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.