Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 20, 20259:00 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous FutureSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Wednesday, May 21, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)CISO Confidential: What's Really Keeping Us up at Night?CISO, Cushman & WakefieldRegistration Level:VIP / Exclusive
8:00 am - 8:45 amThis invitation-only, peer-to-peer discussion tackles what’s top of mind for CISOs. Come ready to share on these topics, among others:
- What are topics your board/leadership care about today?
- Vendors: We are all getting calls but who is or is not adding value for you?
Join the discussion, enjoy the camaraderie, and get ready for the conference day.
8:00 amWiCyS Chicago Affiliate Meeting (open to all attendees)Executive Director, Women in CyberSecurity (WiCyS)Registration Level:Open Sessions
8:00 am - 8:45 amCome meet your local Women in CyberSecurity (WiCyS) affiliate board, as well as WiCyS Executive Director Lynn Dohm. Learn more about the group, say hello, and find out about programs WiCyS has to promote growth of women in the profession.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Securing the Windy City and Beyond: Lessons in Leadership from Top CISOsCISO, City of ChicagoCISO, National GeneralChief Security Officer, Robinhood MarketsCISO, Cushman & WakefieldExecutive Director, Women in CyberSecurity (WiCyS)Registration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Chicago and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.
This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 9th edition of SecureWorld Chicago.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsVP, Chief Information Security & Privacy Officer, University of Chicago MedicineInformation Security Officer, IMC TradingGlobal CISO, Ingredion IncorporatedHead of Security & Compliance, KinderCare Education LLCCISO & CPO, University of Illinois at ChicagoRegistration Level:Conference Pass
10:15 am - 11:00 amThis panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
10:15 amHuman Firewalls: Training Users to Be the First Line of Cyber DefenseDirector of IT – GRC, ClariosVP, Global CISO, ClairosRegistration Level:Conference Pass
10:15 am - 11:00 amDespite the rise of AI-driven attacks and advanced phishing techniques, one of the most effective lines of defense remains the human at the keyboard. In this session, cybersecurity leaders will learn how to build a security-aware culture that transforms employees into strong “human firewalls.” Come ready to hear about:
• Measuring effectiveness beyond checkbox compliance (Carrots & Sticks)
• Designing impactful, role-specific security awareness training
• Combating fatigue and complacency in phishing simulations
• Deep FakesCome ready to learn what’s working, what’s not, and how to empower users to recognize and block sophisticated threats before they reach your defenses.
10:15 amAccelerate Engineering Adoption of Your Cyber Goals with Next-Generation StrategiesRegistration Level:Conference Pass
10:15 am - 11:00 amLearn about next-generation engineering enablement strategies that leverage automation, engineering outreach methods and engineering-focused resources to accelerate engineering adoption of your priority cyber initiatives. These strategies will help you kickstart programs that increase adoption from engineering teams while leveraging the tools and environments that engineers use.
10:15 amThe Evolution of SaaS Security: From Breaches to ResilienceRegistration Level:Open Sessions
10:15 am - 11:00 amAs SaaS adoption accelerates, so do the risks—31% of organizations have already faced a SaaS-related data breach. This session explores emerging SaaS security threats, common misconfigurations, and evolving attacker tactics. By leveraging AppOmni’s insights, we’ll cover proactive threat detection and risk mitigation strategies to help you safeguard critical data and maintain business resilience in today’s dynamic threat landscape.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amPrivacy for Security Professionals: Protecting Data in a Time of UncertaintyMember, Data Privacy & Cybersecurity, Clark Hill LawRegistration Level:Conference Pass
11:10 am - 11:55 amSession details to come.
11:10 amThe Impact of AI on Cybersecurity Roles, Retention, and CultureCMO, Peterson Technology PartnersRegistration Level:Conference Pass
11:10 am - 11:55 amUnlock insights into the evolving landscape of talent deployment and retention as board expectations drive CIOs and CISOs to rethink traditional IT talent models. Explore the impact of GenAI on coding processes and the software engineering lifecycle and discover strategies for optimizing talent allocation and headcounts. Gain actionable insights into defining new roles, cultivating essential skills, and charting GenAI-centric career paths to align with organizational goals and stay ahead in a rapidly changing technological landscape.
11:10 amLeadership Under Pressure: The Hidden Costs and Opportunities in Cybersecurity StressCo-Founder & CEO, Green Shoe ConsultingRegistration Level:VIP / Exclusive
11:10 am - 11:55 amLocation / Room: Room 30Today’s cybersecurity leaders face relentless pressures: expanding attack surfaces, resource limitations, 24/7 availability expectations, and the personal weight of business risk. Our latest research at Green Shoe Consulting reveals two common CISO leadership profiles—the Reactor and the Advisor—each with distinct patterns impacting personal wellbeing and leadership effectiveness.This session, open to Advisory Council members, invited VIPs, and CISO of the Year members, introduces a high-performance stress management framework based on the ARENA resilience training program, adapted for the cybersecurity world. Attendees will learn how to recognize early signs of burnout, apply core resilience skills, and start building a personal strategy for sustainable leadership under pressure. Takeaways:- Identify your current leadership stress profile.
- Recognize how chronic distress impacts decision-making and workplace performance.
- Learn practical, science-backed skills to regulate stress in real-time.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceField CTO, Sumo LogicProduct Security Specialist, InfobloxSr. Solutions Architect, US, BitdefenderSr. Research Engineer, PermisoProduct Manager, Cloud Storage SecuritySVP, CISO , AdaptHealthRegistration Level:Open Sessions
11:10 am - 11:55 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] You Are Not a CISO, You Are a 'CO IS'Cybersecurity Expert; Author of “Cyber Crisis”Registration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Building Your Stress Management Playbook: A Resilience Workshop for Cybersecurity LeadersCo-Founder & CEO, Green Shoe ConsultingRegistration Level:VIP / Exclusive
12:00 pm - 12:45 pmAwareness without action is not resilience. This interactive working session for Advisory Council members, invited VIPs, and CISO of the Year members will guide cybersecurity leaders through designing a practical, personal stress management plan they can immediately apply. Using insights from resilience science and Green Shoe Consulting’s CISO wellbeing research, participants will translate new knowledge into customized strategies to recognize stress triggers, respond intentionally, and recover effectively.Each attendee will leave with a completed Personal Stress Management Worksheet and a 30-Day Resilience Challenge Card—a compact, actionable plan to strengthen leadership clarity, energy, and decision-making even under intense pressure. Takeaways:
- Map your top stress triggers and early warning signs.
- Choose resilience skills tailored to your leadership style.
- Create a simple 30-day personal resilience plan to implement immediately.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmTabletop Exercises in Your PocketCISO, DeVry UniversityRegistration Level:Conference Pass
1:15 pm - 2:00 pmParticipate in the play-through of an interactive tabletop exercise, and learn how to identify, protect, respond, and recover from cyberattacks while creating a more cyber-aware culture. During the exercise, participants will be asked to assume a role in an organization impacted by a simulated cyberattack and discuss cyber incident response actions. Attendees will be given access to virtual resources so they can facilitate simple tabletop exercises within their own organizations.
1:15 pmBenchmarking Your Cybersecurity FrameworkCybersecurity & Privacy Executive | Associate C-CISO | Boardroom Certified QTERegistration Level:Conference Pass
1:15 pm - 2:00 pmIn today’s interconnected digital landscape, organizations face evolving cybersecurity threats that demand robust and adaptable defenses. To ensure optimal security and resilience, it’s crucial to evaluate and measure your cybersecurity framework not just in isolation but in comparison to industry peers and beyond. Benchmarking provides a valuable lens to identify strengths, uncover vulnerabilities, and adopt best practices.
1:15 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityTechnical Director, Security & AI Strategy, DarktraceCo-Founder & CEO, Dune SecurityVP of ML Threat Operations, HiddenLayerPrincipal Cybersecurity Architect, Cummins Inc.Registration Level:Open Sessions
1:15 pm - 2:00 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:00 pmNetworking BreakRegistration Level:Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmThe World's First AI Certification, ISO 42001: What We've Learned After One YearPrincipal | ISO Practice Director | AI Assessment Leader, SchellmanRegistration Level:Conference Pass
2:10 pm - 2:55 pmIn 2024, Schellman became one of the first accredited certification bodies for ISO 42001, providing invaluable insights into AI governance. Our experience revealed that ISO 42001 equips organizations with a robust framework to navigate the complex landscape of AI regulation. By establishing clear guidelines for ethical AI practices, organizations can enhance transparency, accountability, and compliance. This standard not only helps mitigate risks associated with AI deployment but also fosters trust among stakeholders. We believe that ISO 42001 is essential for organizations striving to balance innovation with regulatory demands, ultimately paving the way for responsible AI adoption in diverse sectors.
2:10 pm[Panel] Cybersecurity Challenges for Small and Medium BusinessesDirector of Security, CTC Trading Group LLC (Retired)Security & Infrastructure Manager, Anning-Johnson CompanySr. Strategic Advisor & vCISO, Sentinel TechnologiesPresident & CEO, Malcom Risk AdvisorsRegistration Level:Conference Pass
2:10 pm - 2:55 pmSmall and medium businesses (SMBs) are the backbone of the U.S. economy, generating over half of the annual GDP and employing millions of Americans. But they also face unique cybersecurity challenges that can threaten their survival and growth. In this discussion, learn how to assess and mitigate the cyber risks that SMBs face, and how to implement a robust cybersecurity program with limited resources and expertise. We cover the following topics:
- The state of SMB cybersecurity in the U.S.
- The cost and impact of cyber breaches on SMBs
- The main cyber threats and vulnerabilities that SMBs face
- The best practices and frameworks for SMB cybersecurity
- The steps to build or improve your cybersecurity program
Whether you are an IT manager, a cybersecurity professional, or a business owner, this talk is informative and practical. Walk away with a better understanding of the cyber landscape and the tools and techniques to protect your SMB from cyberattacks.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceRegistration Level:Open Sessions
2:10 pm - 2:55 pmIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
2:55 pmNetworking BreakRegistration Level:Open Sessions
2:55 pm - 3:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:15 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityCISO & VP, IT Operations, Thrivent FinancialVenture Advisor, YL VenturesCISO, Zebra TechnologiesRegistration Level:Open Sessions
3:15 pm - 4:00 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.
Expect candid insights on topics like:
- The toughest decisions CISOs face daily
- Emerging threats and how security leaders are preparing
- The future of security operations, compliance, and resilience
- Strategies for bridging the gap between security teams and executive leadership
- Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.
4:00 pmHappy Hour & Dash for PrizesRegistration Level:Open Sessions
4:00 pm - 5:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- AppOmniBooth: 190
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- BitdefenderBooth: 200
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert* for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.
- Black DuckBooth: 320
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
- Chicagoland Cybersecurity ExchangeBooth: TBD
Chicagoland Cybersecurity Exchange aims to bring together the Chicagoland cybersecurity community as a hub for thought-provoking discussions, hands-on demos and walk-throughs, memorable gatherings, peer networking, and career opportunities.
Comprised of 1,900+ passionate security thinkers, tinkerers, inventors, engineers, architects, analysis, advisors, entrepreneurs and executives, our members are the cybersecurity backbone of Chicagoland and the organizations that call it home.
- CISO of the YearBooth: TBD
The current business climate has seen an unprecedented number of cybersecurity related headlines. Hackers to Nation State actors have been shown to be constantly probing Organizations defenses with the intent to break in, disrupt operations, monetize information, and steal intellectual property. Between these threats and the increasing regulatory climate, never has the Chief Information Security Officer (CISO) been asked to navigate more difficult terrain.
Originally patterned after the Chief Information Officer (CIO) of the Year Award sponsored by the Association of Information Technology Professionals (AITP Chicago), SIM-Chicago and the Executive Club of Chicago, this program seeks to recognize outstanding CISOs for the contributions they make to their organizations, the Information Security profession and the local community. The award process is overseen by the Chicago CISO of the Year Program, which is a not-for-profit affiliated with AITP Chicago and managed by local area security leader volunteers.
- Cloud Storage SecurityBooth: 170
Cloud Storage Security is a leader in cloud and on-premises data protection, enabling businesses to operate securely and efficiently. Built with a singular focus on securing the world’s data, our advanced malware detection and data loss prevention solutions help organizations eliminate threats, reduce risk, and ensure compliance.
Trusted by commercial enterprises, regulated industries, and public sector organizations worldwide, Cloud Storage Security is reshaping the way businesses safeguard their data. Our commitment to security is backed by industry-leading certifications, including SOC 2 Type II, and recognition as an AWS Public Sector Partner with an AWS Qualified Software offering, AWS Security Competency, and AWS Authority to Operate.
- DarktraceBooth: 220
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.
- Dune SecurityBooth: 380
Dune Security is the world’s first and best User Adaptive Risk Management solution.
Powered by AI, we automatically deliver User Adaptive Testing and User Adaptive Training to quantify employee risk with comprehensive data from any connected source. For higher-risk users, our platform integrates seamlessly with the broader security stack todynamically adapt security and protect areas of weakness.
Backed by Toba Capital, Craft Ventures, Mass Mutual Ventures, Alumni Ventures, Firestreak Ventures, and Antler, we empower CISOs to proactively manage human risk—the leading cause of cybersecurity breaches—and build safer, more resilient organizations. - HiddenLayerBooth: 340
HiddenLayer is the leading provider of Security for AI. Its security platform helps enterprises safeguard the machine learning models behind their most important products. HiddenLayer is the only company to offer turnkey security for AI that does not add unnecessary complexity to models and does not require access to raw data and algorithms. Founded by a team with deep roots in security and ML, HiddenLayer aims to protect enterprise’s AI from inference, bypass, extraction attacks, and model theft. The company is backed by a group of strategic investors, including M12, Microsoft’s Venture Fund, Moore Strategic Ventures, Booz Allen Ventures, IBM Ventures, and Capital One Ventures.
- HUMAN SecurityBooth: 310
HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.
- InfobloxBooth: 100
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.
- InfraGard ChicagoBooth: TBD
All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.
The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.
- ISACA Chicago ChapterBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.
Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)
Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.
- ISSA Chicago ChapterBooth: TBD
The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.
Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.
- KeeperBooth: 230
Manage, protect and monitor all your organization’s passwords, secrets and remote connections with zero-trust security.
- Permiso SecurityBooth: 350
Permiso Security provides comprehensive identity protection and detection for human and non-human identity threats at all stages of the identity lifecycle, across all environments. The company is backed by Altimeter Capital, Point72, Foundation Capital, Work-Bench, 11.2 Capital and Rain Capital.
- Rapid7Booth: 210
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- Robert HalfBooth: 330
Robert Half, the world’s first and largest specialized talent solutions firm, connects opportunities at great companies with highly skilled job seekers. We offer contract, temporary and permanent placement solutions for roles in finance and accounting, technology, marketing and creative, legal, and administrative and customer support. Named to Fortune’s World’s Most Admired Companies and 100 Best Companies to Work For® lists and a Forbes Best Employer for Diversity, Robert Half is the parent company of Protiviti®. Robert Half is traded on the New York Stock Exchange (symbol: RHI) and is a member of the S&P 500 index.
- SilverfortBooth: 360
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.
- Sumo LogicBooth: 240
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- Tevora + ProcessUnityBooth: 180
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.
ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.
- ThreatLockerBooth: 260
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- TrustmiBooth: 270
Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7. Our AI-driven platform instantly detects suspicious activity and human errors by continuously analyzing millions of data points, including vendor actions, emails, files, and payment details. Trustmi helps you accelerate digital transformation by reducing manual verification efforts and enhancing the efficiency and security of your payment processes, ensuring a smarter, faster approach to fraud prevention.
- WiCyS Chicago AffiliateBooth: TBD
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Erik Hart, ModeratorCISO, Cushman & Wakefield
Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.
Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.
- Lynn DohmExecutive Director, Women in CyberSecurity (WiCyS)
Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.
- Bruce CoffingCISO, City of Chicago
Bruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank of America and was a Senior Manager at consulting firm Accenture. Mr. Coffing holds the Certified Information Systems Security Professional (CISSP) certification.
- Todd CovertCISO, National General
Todd is a seasoned cybersecurity executive with over two decades of experience driving information security strategies in highly regulated environments. As Chief Information Security Officer at National General, he has spearheaded transformative initiatives and the integration of acquired organizations. With a passion for fostering proactive security cultures and driving innovation responsibly, he is committed to empowering organizations to navigate the complex cybersecurity landscape with confidence.
A trusted advisor to senior leadership, he excels in aligning security initiatives with business objectives, ensuring compliance with regulations such as NY DFS, HIPAA, GDPR, and meeting PCI DSS requirements.
Todd holds an MBA and multiple certifications, including CISSP, CDPSE and Associate C|CISO. - Erika DeanChief Security Officer, Robinhood Markets
Erika Dean is Chief Security Officer of Robinhood Markets. She oversees the Security, Privacy and Corporate Engineering organizations, which include the information security and productivity functions. Erika has over 20 years of experience in the security industry. Prior to joining Robinhood, she spent over 20 years at Capital One Financial, where she held a variety of leadership positions in cybersecurity, including serving as the Chief Information Security Officer for US Card, International, and Small Business.
- Erik HartCISO, Cushman & Wakefield
Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.
Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.
- Lynn Dohm, ModeratorExecutive Director, Women in CyberSecurity (WiCyS)
Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.
- Karen HabercossVP, Chief Information Security & Privacy Officer, University of Chicago Medicine
Karen Habercoss is the Vice President, Chief Information Security and Privacy Officer for The University of Chicago Medicine health system. She is responsible for the enterprise strategy and operations of the health system Information Security and Privacy Office. Karen has a Master’s Degrees in Business Administration and Clinical Social Work. Prior to her current role, she worked in the Compliance Department at The Joint Commission and as the Corporate Compliance and Quality Officer for PRS, LLC. Karen holds the following certifications: CIPM, CDPSE, AIGP, CCEP, CHC, CHPC, and CHRC and maintains her licensure in clinical social work. She is the current chair of the HIMSS Cybersecurity, Privacy, and Security Committee and has been an active member of the Association of American Medical Colleges Compliance Officers’ Forum for many years where she is the chair-elect of the Steering Committee. Karen is the past co-lead the Privacy-Security Task Group for the Healthcare and Public Health Sector Coordinating Council Cybersecurity Working Group. She speaks regularly on the topic of Privacy-Security collaboration strategies to reduce enterprise risk.
- Jatin MannepalliInformation Security Officer, IMC Trading
Jatin Mannepalli, CISSP, CCSP, is an Information Security Officer (ISO) at IMC Trading, with more than 10 years of experience in the InfoSec field. He has led information security and risk management teams, and worked as a security consultant for major firms like McKinsey & Company. Jatin specializes in security governance, risk management, and creating customer-centric, technology-driven security strategies. His approach focuses on aligning security with organizational goals, and he is recognized as a top voice in Information Security on LinkedIn. He has published articles in Dark Reading, contributes to cybersecurity by developing ISC2 exams, and volunteers to raise security awareness in local communities.
- Kenneth TownsendGlobal CISO, Ingredion Incorporated
Kenneth Townsend is a proven results-oriented CISO with a successful track record of delivering business value by leveraging technology and leading transformational cybersecurity strategies. Kenneth’s understanding of the digital technology stack across the enterprise and cyber risk management has allowed him to successfully operate in a variety of industries and become a highly respected leader in Financial Services, Retail, Healthcare, and Manufacturing.
As the Global CISO for Ingredion, Kenneth is responsible for establishing and executing a cyber strategy to manage risk across the corporate and manufacturing environments. He brings a deep understanding of cybersecurity threats, regulations, and best practices to the role to build a strong security culture. Beyond his core responsibilities, Kenneth is a dedicated thought leader in the cybersecurity community. He is a cyber product advisor, active speaker at various industry events, and volunteers time to support and mentor youth in STEM fields.
- Sean VenturaHead of Security & Compliance, KinderCare Education LLC
Sean has over three decades of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Head of Information Security and Compliance at KinderCare, one of the nation’s largest accredited early learning education systems, implementing and maintaining the company’s security and compliance Prior to KinderCare, Sean Served as the Chief Information Security Officer, at Atmosera, providing security and compliance expert advisory to Atmosera’s clientele. He brings extensive experience in lean team management within infrastructure and security business units, providing a reliable and secure environment across a wide range of regulatory and legal frameworks. Sean has held progressively more senior roles with ESCO one the world’s largest steel manufacturer of ground engagement equipment, Gogo Air, providing security advisory and design for all the commercial wireless services, DDB/Omnicom, a worldwide marketing communications firm, as well as financial institutions, and national retail chains.
- Shefali Mookencherry, ModeratorCISO & CPO, University of Illinois at Chicago
Shefali is a seasoned professional with expertise in information security, privacy, higher education, HIPAA, research, healthcare policy and strategy, promoting Interoperability (PI), and compliance. With 20+ years of cybersecurity, privacy, and higher education experience—including 30+ years of healthcare experience. She is acknowledged as a cybersecurity and privacy subject matter expert (SME) and highly sought after for thought leadership opportunities. Shefali also has a keen interest in the adoption of innovative technology and provides leadership, consultation, coordination, and integration of information processes with enterprise-wide information technology and information security and privacy strategies.
- Annie ForrerDirector of IT – GRC, Clarios
- Prasanna RamakrishnanVP, Global CISO, Clairos
- AppOmni Representative
- Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Data Privacy & Cybersecurity, Clark Hill Law
Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
- George WangCMO, Peterson Technology Partners
George is a business technology leader with over 30 years’ experience in startup, mid-sized and Fortune 500 firms. As the Chief Marketing Officer at PTP, George is responsible for strategic growth, client relationships, and new business development. George was also a former CIO and COO with industry experiences in seven different verticals.
George has a BS in Computer Engineering from the University of Illinois Urbana-Champaign and a MS in Engineering Management from National Technological University. In addition to his work with PTP, George also serves on the board of SIM Chicago and volunteers for various non-profits, including I.C.Stars, Northeastern Illinois University Advisory Board, and Teen Innovators Board.
- Steve Shelton, ModeratorCo-Founder & CEO, Green Shoe Consulting
Steve Shelton founded Green Shoe Consulting with a singular mission: to alleviate the suffering caused by chronic distress and burnout in the cybersecurity industry. Having spent nearly 20 years on the front lines of cybersecurity sales with companies like CDW, Symantec, RSA, Proofpoint, and Check Point, Steve witnessed firsthand the relentless stress, high stakes, and emotional toll that security professionals endure daily. He saw talented leaders and teams struggle under the weight of constant crisis response, organizational pressure, and the personal cost of burnout—and he knew something had to change.
Drawing from his expertise as a cognitive performance professional, Steve now applies evidence-based mental skills training to help CISOs and cybersecurity teams thrive under pressure, make better decisions in crisis, and sustain long-term performance without sacrificing well-being. His work bridges the gap between cybersecurity’s unique demands and the science of resilience, offering practical, high-impact strategies to leaders and teams navigating one of the most stressful industries in the world.
Through Green Shoe Consulting, Steve is leading a new movement in cybersecurity—one where resilience is a strategic advantage, burnout is preventable, and professionals no longer have to choose between success and their own mental health.
- Brandon BorodachField CTO, Sumo Logic
Brandon K. Borodach is a cybersecurity thought leader and Field CTO at Sumo Logic, specializing in SIEM evolution, detection engineering, and cloud security. With deep expertise in security analytics, AI-driven threat detection, and multi-platform SIEM strategies, he has helped organizations modernize their security operations. Brandon has led security engineering and pre-sales teams at Sumo Logic and Anvilogic, pioneering detection-as-code methodologies and scalable security architectures across cloud-native and hybrid environments.
Holding a Master of Science in Cybersecurity with a concentration in Information Assurance, Brandon combines technical depth with strategic vision to drive cybersecurity innovation. He is passionate about enabling organizations to enhance their security posture in an ever-evolving threat landscape.
- Andrei IonescuSr. Solutions Architect, US, Bitdefender
Andrei has been in cybersecurity for 20 years; the last 13 he has been working for Bitdefender. In his day to day role, he helps enterprises to adopt Bitdefender inside their security stack while ensuring a smooth transition to our tools and services.
- Andrew KrautSr. Research Engineer, Permiso
Born with a screwdriver in his hand, Andy has been digging into the internals of technology since he opened his eyes and in the security industry since the era of dial-up. Proudly a generalist, Andy has turned his hand at a wide swath of security industry focuses on both the offensive and defensive sides over the last 25 years. When he’s not breaking systems and questioning assumptions, you can find him suspiciously connecting his laptop to things, pushing buttons that say “Do not press,” biking mountains, and climbing rocks.
- Connor Surkau-ParkinsonProduct Manager, Cloud Storage Security
Connor Surkau-Parkinson is a Product Manager at Cloud Storage Security, where he collaborates with a skilled team to develop innovative security solutions for organizations that store, ingest, and transmit data in the cloud. During his time at CSS, Connor has played a key role in delivering major enhancements across multiple initiatives — including deepening AWS integrations, refining scanning capabilities, and broadening support for various storage types. His technical expertise and strategic insight have been instrumental in driving impactful product improvements that align with the evolving cybersecurity landscape.
- Michael Myint, ModeratorSVP, CISO , AdaptHealth
A transformational leader with nearly thirty years of experience in information security and technology delivering business resilience to defend against the latest threats. Strategic, tactical, and a true hands-on practitioner… a business aligned pragmatic builder with over ten years of experience leading the information security program across four companies: two Fortune500’s, and two start-up organizations. Service oriented, began his career as a consultant (Accenture, Cap Gemini Ernst & Young, Deloitte) building security capabilities for clients in Healthcare, Financial Services, and Manufacturing. Having led teams as small as five and as large as two hundred with budgets ranging from seven to eight figures. Delivering cohesiveness and optimal performance from his teams while developing future leaders; CEO, CIO, CISO, VP InfoSec, etc.
He has revamped existing information security programs to expand capabilities and defend against the latest threats, as well as built programs from the ground up at high-growth organizations. He has been instrumental in building information security capabilities focused on compliance, security operations, and product development.
- Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”
Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
- Steve Shelton, ModeratorCo-Founder & CEO, Green Shoe Consulting
Steve Shelton founded Green Shoe Consulting with a singular mission: to alleviate the suffering caused by chronic distress and burnout in the cybersecurity industry. Having spent nearly 20 years on the front lines of cybersecurity sales with companies like CDW, Symantec, RSA, Proofpoint, and Check Point, Steve witnessed firsthand the relentless stress, high stakes, and emotional toll that security professionals endure daily. He saw talented leaders and teams struggle under the weight of constant crisis response, organizational pressure, and the personal cost of burnout—and he knew something had to change.
Drawing from his expertise as a cognitive performance professional, Steve now applies evidence-based mental skills training to help CISOs and cybersecurity teams thrive under pressure, make better decisions in crisis, and sustain long-term performance without sacrificing well-being. His work bridges the gap between cybersecurity’s unique demands and the science of resilience, offering practical, high-impact strategies to leaders and teams navigating one of the most stressful industries in the world.
Through Green Shoe Consulting, Steve is leading a new movement in cybersecurity—one where resilience is a strategic advantage, burnout is preventable, and professionals no longer have to choose between success and their own mental health.
- Dr. Fred KwongCISO, DeVry University
Dr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security Officer. He is a member of several advisory boards and is a frequent speaker at national security forums on cyber security and information technology and is often asked to consult on matters of security and leadership
Fred also serves as an adjunct faculty member at Roosevelt and Benedictine Universities. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his Doctorate in organization development from Benedictine University. Fred has earned several certifications including the CISSP, CISA, CISM, CDPE, PCIP, PMP and ITILv3f.
- Stella Danso, CISM, CRISC, CDPSECybersecurity & Privacy Executive | Associate C-CISO | Boardroom Certified QTE
Stella is a distinguished risk management executive with a proven track record of transforming global organizations to drive meaningful risk reduction, optimize operational costs, and enable sustainable growth in an increasingly data-driven world. With deep expertise in aligning business strategy with technology, security, and privacy, she ensures organizations achieve legal and regulatory excellence while fostering innovation.
Stella’s career spans diverse industries, including e-commerce, retail, quick service restaurants, consumer packaged goods (CPG), telecommunications, insurance, and investments. She has contributed to the success of iconic global brands such as Optus Communications and Siemens in Australia, as well as 3Com, Allstate, Kellogg’s, McDonald’s, and most recently, Expedia Group in the United States.An expert in designing and implementing enterprise-scale information security and business transformation programs, Stella consistently drives initiatives that enhance organizational resilience, boost business performance, and develop top-tier talent. Her efforts have established her as a leader in crafting strategies that unify security, privacy, and governance.
Stella is highly adept at leading global, strategic security and privacy initiatives, leveraging internationally recognized frameworks such as ISO 27001 and NIST. She champions privacy-by-design principles and AI risk management frameworks, leveraging industry best practices to deliver operational excellence, drive standardization, and orchestrate seamless business outcomes. Her ability to bridge technical expertise with strategic vision has made her an invaluable asset to the organizations she serves.
- Dr. Margaret CunninghamTechnical Director, Security & AI Strategy, Darktrace
- Dave DellaPelleCo-Founder & CEO, Dune Security
David DellaPelle is the Co-Founder and CEO of Dune Security. With a visionary yet pragmatic approach, he leads Dune in tackling one of today's most pressing enterprise challenges: employee-based cyber risks. David holds a BS in Economics and Management from Cornell University and an MBA from NYU, where he received the prestigious Andre Koo Tech Scholarship. He drove security product innovation and revenue growth at leading cybersecurity and AI companies, including Perimeter 81, At-Bay, and Waycare, following an early career in management consulting at EY.
- Travis SmithVP of ML Threat Operations, HiddenLayer
Travis Smith is the Vice President of ML Threat Operations at HiddenLayer where he is responsible for the services offered by the organization, including red-teaming machine learning systems and teaching adversarial machine learning courses. He has spent the last 20 years building enterprise security products and leading world class security research teams. Travis has presented his original research at information security conferences around the world including Black Hat, RSA Conference, SecTor, and DEF CON Villages.
- Sankarasubramaniam Chockalingam, ModeratorPrincipal Cybersecurity Architect, Cummins Inc.
- Danny ManimboPrincipal | ISO Practice Director | AI Assessment Leader, Schellman
Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)
- Walter LefmannDirector of Security, CTC Trading Group LLC (Retired)
Walter Lefmann is recently retired from Director of Security at CTC Trading Group LLC, a capital markets trading firm. That role has included Information Security, Physical Security and Life Safety, Privacy, and BCP/DR.
He has been practicing cybersecurity with varying focus for his entire professional career. The balance has shifted back and forth over time between technology engineering/operations and security over the years, which has led to a well-balanced business-focused approach to security.The professional journey to CTC came by way Goldman Sachs, Hull Trading Company, and Motorola; from an early career as an experimental physicist at the Fermi National Accelerator Laboratory. Walter holds a PhD, MPhil, and MA in Physics from Columbia University, and a BS in Physics from Stevens Institute of Technology. While at Columbia University, Walter also served for five years as a volunteer NYC Auxiliary Police Officer and Sergeant. The experience of working closely with the public sector to serve and improve the community was tremendously rewarding, and has shaped a lifelong respect for the dedicated people who face the challenges of that service!
Walter in retirement is focused on giving back to the community via professional and public/private outreach organizations, including FBI InfraGard (currently serving as a Chicago Chapter Board Chair), Chicago FIRST (Board Officer), US Secret Service Cyber Fraud Task Force, FS-ISAC, the National Technology Security Coalition, and ASIS, and is one of the founders of the ChiBrrCon security conference and recently volunteering with Docent.org and the CornCon conference.
Walter received the Infragard North Central Region “Meeting the Challenge” award for 2022, and the 2022 “Chicago CISO of the Year” award in the MIDCAP category. Outside of work, Walter is an avid scuba diver (even diving in Lake Michigan… yes, it’s COLD!), sings tenor in the Harper Festival Chorus community group, and dances with his wife whenever he can.
- Trent RidgwaySecurity & Infrastructure Manager, Anning-Johnson Company
- Arvin VermaSr. Strategic Advisor & vCISO, Sentinel Technologies
Arvin Verma is a highly motivated cybersecurity professional, with over 14 years of experience across a multitude of cyber and IT domains. He has worked in multiple industries spanning over 5 Fortune 500 companies and Big 4 consulting. He is currently a vCISO within the SMB segment.
In addition, Arvin proudly served in the US Navy Reserves as a Cryptologic Warfare Officer. He also serves as a research fellow with the Cybersecurity Forum Initiative where he has co-authored several research papers in new cyber trends and best practices.
Arvin holds several leadership positions with InfraGard Chicago and InfraGard National. He currently serves as the National Sector Chief for the Information Technology Sector, National Sector Security and Resilience Program of InfraGard National.He also serves as an advisor to several private and public entities, several startup organizations and is a guest lecturer at several universities across the State of Illinois.
Arvin is ISC2 CISSP certified, CompTIA Security+ certified, ISO 27001 Lead Auditor certified and a CMMC Registered Practitioner. - Dave Malcom, ModeratorPresident & CEO, Malcom Risk Advisors
David Malcom is a creative thought leader with over 24 years of experience in cybersecurity, internal audit, data analytics, and risk consulting. David launched Malcom Risk Advisors in July 2024 with a mission to ensure that all small and medium sized businesses could gain access to a cybersecurity executives, at a cost that fits their budget. Prior to launching Malcom Risk Advisors, David held multiple executive leadership positions at global organizations, including Chief Audit Executive at Groupon, Managing Director of Internal Audit at The Northern Trust Company, Global IT Audit and Data Analytics Leader at Accenture, and Chief Information Security Officer at Hyatt Hotels Corporation. Recognized as the 2023 Auditor of the Year by the Institute of Internal Auditors (Chicago Chapter), David has transformed high-performing, global teams through the implementation of data-driven strategies that enhance control testing, quantify risk assessment processes, and create continuous auditing capabilities that increases the assurance of the operating effectiveness of controls in real-time.
David has also consulted with multiple venture capital and private equity organizations to increase their awareness and understanding of cyber security risks related to emerging technologies (e.g., artificial intelligence) and data protection as part of completing their due diligence activities. David holds a Bachelor of Arts in Accounting from Illinois Wesleyan University and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).
In addition to leading Malcom Risk Advisors, David is also a pastoral resident at Renewal Church of Chicago and is pursuing his Master’s in Biblical Preaching at Moody Bible Institute. Outside of work, David leads an active lifestyle and is proficient in multiple martial arts.
- Mary Elizabeth FaulknerCISO & VP, IT Operations, Thrivent Financial
Mary Elizabeth Faulkner serves as VP, Chief Information Security Officer (CISO) and VP of IT Operations for Thrivent , its subsidiaries and affiliates. This role reports directly to the Chief Digital, Data & Technology Officer.
As the CISO and head of IT Operations, Mary Elizabeth is responsible for leading teams that execute the Fortune 500 diversified financial service organization’s information security strategy; provide management and oversight; support cyber defense engineering, identity and access management engineering and operations; incident response; information risk management and assurance services; technology service centers; fulfillment; IT incident response; and operations centers.
Mary Elizabeth has over 25 years of experience in information security, litigation advisory services, and audit. She has served in security advisory roles for a number of industries, including technology, insurance, retail, gaming, government, automotive and manufacturing. She has led global IT organizations driving maturity in information security, network and security operations.. Her experience spans across many domains of information security strategy, information risk management, cyber defense operations, cyber defense engineering, identity and access management, IT general controls, incident response, and forensic investigations.
Mary Elizabeth received a master’s in technology management from Georgetown University. She holds CRISC and CDPSE certifications. Mary Elizabeth is a Board of Director member for the FAIR Institute.
- Jay GonzalesVenture Advisor, YL Ventures
- Mike Zachman, ModeratorCISO, Zebra Technologies
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
