Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 19, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageSr. Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmYour CEO just asked about AI security. Do you have an answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation. - Wednesday, May 20, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSimple Daily Habits to Strengthen Your Security PostureRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The Changing Dynamics of the Role of a CISO in the Age of AIFocus Areas: CISO Strategy; AI Governance and Ethics; Proactive Risk ManagementVP & Global CISO, HanesBrands Inc.Registration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterAs the role of CISO continues to evolve, several key trends are shaping the future responsibilities of individuals in this position and their teams:1. There is a noticeable trend towards increased scrutiny on the decision-making processes of CISOs. Stakeholders are placing a greater emphasis on understanding and evaluating the rationale behind cybersecurity strategies and actions.2. Ethical considerations in handling data breaches are becoming a focal point for CISOs. It is essential for CISOs to not only address breaches effectively but also to do so in an ethical manner that prioritizes the protection of individuals’ data and privacy.3. The landscape of regulations governing CISO roles may be shifting towards more stringent requirements. CISOs may need to navigate a complex web of compliance standards and regulations to ensure the organization’s cybersecurity practices align with legal expectations.4. Proactive cybersecurity measures are gaining importance within organizations. CISOs are expected to anticipate and mitigate potential threats before they materialize, rather than solely reacting to incidents after they occur.5. Building a culture of transparency and accountability within CISO teams is emerging as a critical focus area. CISOs are tasked with fostering an environment where team members feel empowered to raise concerns, share information, and take ownership of cybersecurity initiatives.Hear how CISOs and their teams can navigate the new age of cybersecurity, one that is continually evolving.9:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
10:15 amFrom Risk to Resilience: Engaging the Enterprise for Smarter SecurityFocus Areas: Enterprise Risk Management (ERM); Security Culture & Accountability; Business-Centric GRCVP, Security & Compliance, IMO HealthRegistration Level:
Conference Pass
10:15 am - 10:50 amRisk management isn’t just a compliance exercise—it’s a competitive advantage when done right. This session dives into how organizations can turn risk awareness into a shared responsibility across the enterprise, creating a culture where security and business goals work hand in hand.We’ll explore proven strategies for embedding risk practices into strategic planning, daily operations, and the software development lifecycle, while meeting requirements for frameworks like SOC 2 and HIPAA. Learn how to prioritize risks based on real business impact, involve key stakeholders in their assessment, and get buy-in from leadership to drive accountability. Join us to discover how to transform risk management into a proactive, business-enabling force that builds trust, transparency, and resilience.10:15 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 am[Panel] Beyond the Red Line: Human Sustainability in the 24/7 Threat CycleFocus Areas: Mental Health & Burnout Prevention; Executive Resilience & Leadership; Psychological Risk & CultureSr. Director, Cybersecurity & Risk Management, Rich Products CorporationRegistration Level:
Open Sessions
10:15 am - 10:50 amThis isn’t your typical leadership panel. In this candid, high-impact session, a group of senior cybersecurity leaders will step away from the dashboard to discuss the one metric they rarely report to the board: their own mental resilience. Moving beyond high-level platitudes, our panelists will openly share their personal “red line” moments—the times when the pressure of constant vigilance, regulatory accountability, and the 24/7 threat cycle became unsustainable. They will discuss the psychological toll of “imposter syndrome” in an AI-accelerated landscape and the heavy weight of the accountability-responsibility gap.
The discussion will pivot from struggles to solutions, exploring evidence-based protocols and strategic boundary-setting that allows them to lead effectively without losing themselves to the job.
10:50 amNetworking BreakRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amSecuring Cloud-Native Environments: Containers, Kubernetes, and ServerlessRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:10 am[Panel] Bridging the Gap: The Role of the BISO in Modern CybersecurityFocus Areas: Business Information Security Officer (BISO); Executive Alignment; Security Career PathsBISO, The Kraft Heinz CompanyBISO, Gallagher BassettRegistration Level:
Conference Pass
11:10 am - 11:45 amAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed ThreatsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)CISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber Connect – Then and Now: Teaching Seniors How to Stay Safe OnlineFocus Areas: Security Awareness & Education; Strategic Communication & Storytelling; Human-Centric Security & AdvocacyExecutive Director, National Cybersecurity AllianceDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThis interactive workshop equips security experts with tools to engage seniors with clear, empathetic communication about online safety. Using free custom-created resources, attendees will learn to teach without fear or jargon, and leverage analogies and storytelling. Come ready to gain skills that also translate to business settings, and any situation requiring communication with non-technical audiences.
1:15 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] The Talent Equation: Reimagining Recruitment and Retention in CybersecurityFocus Areas: Workforce Development & Retention; Cyber Leadership & Culture; Talent Acquisition & Strategic HiringDirector of Strategic Innovation, Evolve ProjectCISO, Zebra TechnologiesVP of Technology, Power ConstructionCMO, Peterson Technology PartnersRegistration Level:
Open Sessions
1:15 pm - 1:50 pmThe cybersecurity industry faces a persistent paradox: while the demand for skilled professionals has never been higher, the traditional pathways for finding and keeping them are increasingly falling short. In a landscape defined by rapid technological shifts and high-stakes pressure, the “talent gap” is no longer just a numbers game—it is a strategic challenge that requires a fundamental rethink of how we value and support the human element of security.This panel brings together industry veterans, talent strategists, and organizational leaders to dissect the evolving mechanics of the cyber labor market. Moving beyond standard hiring checklists, the discussion will focus on creating a sustainable ecosystem where professionals can thrive, grow, and remain engaged for the long term.1:15 am[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceRegistration Level:
Open Sessions
1:15 am - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pmHow to Make Cyber Insurance an Ally in Incident ResponseFocus Areas: InsurSec; Risk Management & Financial Recovery; Incident Readiness & Policy ComplianceCybersecurity and Privacy Attorney, Clark Hill PLCRegistration Level:
Conference Pass
2:10 pm - 2:45 pmMost cybersecurity professionals know cyber insurance only through the annoyingly long questionnaires. But how can you use cyber insurance as an ally during an incident? How can you work with them to make sure that they cover your loss from an incident?
2:10 pmBuilding Incident Response Plans for Highly Distributed WorkforcesRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityDirector of Global Network Security Platforms, McDonald'sRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask Us Anything! A Live Conversation with Security LeadersFocus Areas: Leadership, Decision Making, CommunicationCISO & Chief Privacy Officer, University of Illinois at ChicagoCISO, Zebra TechnologiesCISO, Cushman & WakefieldRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterIn an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.
This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.
Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.
Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.
3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- AppOmniBooth: TBD
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- Black DuckBooth: TBD
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
- BrinqaBooth: TBD
Make security chaos work for you with AI-powered Exposure Management, built on data. The Brinqa platform delivers scalable, AI-driven exposure management that unifies every data source for a complete picture of risk. Separate false alarms from real risk by uniting Security and IT, accelerating remediation, and delivering a single, trusted source of truth for the business.
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Chicago CISO of the YearBooth: TBD
The current business climate has seen an unprecedented number of cybersecurity related headlines. Hackers to Nation State actors have been shown to be constantly probing Organizations defenses with the intent to break in, disrupt operations, monetize information, and steal intellectual property. Between these threats and the increasing regulatory climate, never has the Chief Information Security Officer (CISO) been asked to navigate more difficult terrain.
Originally patterned after the Chief Information Officer (CIO) of the Year Award sponsored by the Association of Information Technology Professionals (AITP Chicago), SIM-Chicago and the Executive Club of Chicago, this program seeks to recognize outstanding CISOs for the contributions they make to their organizations, the Information Security profession and the local community. The award process is overseen by the Chicago CISO of the Year Program, which is a not-for-profit affiliated with AITP Chicago and managed by local area security leader volunteers.
- CofenseBooth: TBD
Cofense® is the original and leading provider of security awareness training and email phishing simulation, offering global enterprise-level advanced email threat detection and remediation solutions. Cofense PhishMe® and Cofense Phishing Detection and Response (PDR) offer the world’s only platforms to leverage over 35 million Cofense-trained employees who actively report suspected phishing and other dangerous email threats in real-time. Exclusive only to Cofense, this reporting system ingests and catalogs thousands of threats per day that are missed by current email gateway technologies and then eradicates those threats from customer inboxes. In short, Cofense sees and stops threats other email security systems miss. Please visit www.cofense.com or connect with us on X and LinkedIn for additional information.
- Concentric AIBooth: TBD
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- Imper.aiBooth: TBD
imper.ai prevents AI-driven impersonation and social engineering by analyzing the device, network, and behavioral signals attackers can’t fake. Its real-time risk scoring and automated blocking verify every participant across voice, video, and chat before trust is established.
- InfraGard ChicagoBooth: TBD
All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.
The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.
- ISACA Chicago ChapterBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.
Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)
Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.
- ISC2 Chicago ChapterBooth: TBD
The mission of the Chicago Chapter is to advance the local Chicagoland information security community by providing its members with opportunities to increase knowledge, grow professional networks, share information and advance the profession as a whole by promoting certification, ethical behavior, and social responsibility.
Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification. Our chapter program is focused on sharing knowledge and exchanging ideas among security professionals in the local area. Ultimately, we want to advance the field of information security by educating practitioners and the public at large on how to protect and defend against security threats.
- ISSA Chicago ChapterBooth: TBD
The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.
Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- OWASP ChicagoBooth: TBD
The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. Our programming includes:
- Community-led open source projects including code, documentation, and standards
- Over 250+ local chapters worldwide
- Tens of thousands of members
- Industry-leading educational and training conferences
We are an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security.
- SemperisBooth: TBD
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- Splunk, a Cisco CompanyBooth: TBD
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- WiCyS Chicago AffiliateBooth: TBD
WiCyS is a global community of over 11,000 women and allies dedicated to recruit, retain, and advance women in cybersecurity. We have 72 professional affiliates and over 300 student chapters in over 100 countries. WiCyS stands as the nonprofit organization that creates accessibility and opportunities for the cybersecurity workforce. With many initiatives and programming efforts, we continue to pave paths for many to get into cybersecurity and advance because of it. Our strategic partners, philanthropic funders, and conference sponsors are the foundation for making this happen.
- Zafran SecurityBooth: TBD
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Rodney Beard, CISSP - InstructorSr. Cyber Risk Analyst, Cyber Risk Opportunities LLCRodney Beard, CISSP, is a cybersecurity consultant with Cyber Risk Opportunities LLC, bringing more than 20 years of experience protecting organizations across defense, government, and financial services sectors.
Most recently, Rodney served as Information Security Officer at Rivermark Community Credit Union, a $2B institution in Oregon, where he built and led the enterprise security program for seven years. His responsibilities included penetration testing, security architecture, incident response, vendor risk management, and developing security awareness training for employees.
Prior to financial services, Rodney spent eight years as an IT Specialist with the U.S. Army at White Sands Missile Range, where he served as Information Management Officer responsible for IT security across 22 regional locations and 250 employees. He implemented security policies aligned with NIST, Federal, and DoD standards while managing a program portfolio valued at $2.5 million.
Rodney has also taught technology courses as an Adjunct Instructor at Vista College, preparing students for CompTIA A+ and Network+ certifications.
He holds the CISSP certification, CompTIA Security+, Network+, and A+, along with multiple Microsoft certifications. Rodney is based in Casper, Wyoming, and works remotely with clients nationwide.
John Opala, PhDVP & Global CISO, HanesBrands Inc.Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.
Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.
In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.
Lori KevinVP, Security & Compliance, IMO HealthA cybersecurity and compliance executive with a passion for building resilient organizations through strategic risk management, governance, and security leadership. I lead enterprise security and compliance programs that protect critical assets, ensure regulatory alignment, and enable business resilience. With over 20 years of experience in cybersecurity, I specialize in translating complex risk landscapes into actionable strategies that drive trust and performance. My focus is on building strong security cultures, aligning governance with business goals, and mentoring the next generation of security leaders.
Joe MariscalSr. Director, Cybersecurity & Risk Management, Rich Products CorporationHead of Cybersecurity, 20+ years in InfoSec/Cyber. MBA, Masters in Cyber, CISSP, CISM.
Panel Discussion
Sarah BuergerBISO, The Kraft Heinz CompanySarah Buerger serves as the Business Information Security Officer for The Kraft Heinz Company.
Ed YousfiBISO, Gallagher BassettEd is the Business Information Security Officer for Gallagher Bassett and Global Head of Third Party Risk Management for Gallagher. He is an accomplished leader with over 20 years of experience in information security and IT GRC. He has built cybersecurity programs with emphasis on IT risk management, vulnerability management, third party risk , and IT governance. Ed has worked primarily in financial services, retail, and health care for multiple global companies.
Panel Discussion
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Lisa PlaggemierExecutive Director, National Cybersecurity AllianceLisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Brian PichmanDirector of Strategic Innovation, Evolve Project
Mike ZachmanCISO, Zebra TechnologiesI am a high-performing, globally-experienced executive with extensive information security, product security, enterprise risk management and information technology leadership experiences. I believe my unique blend of leadership positions across these disciplines has given me a well-rounded and results-oriented approach.
I have demonstrated proficiency in driving transformational change through leadership vision, collaboration and execution. Recruited to Zebra Technologies as Chief Security Officer (CSO), I am providing strategic leadership for Zebra's information security, product security, business continuity, and corporate security programs across the global enterprise. Previously, as Caterpillar’s first CISO, I rallied support from numerous stakeholders, created a shared vision, and built a new program with measurable improvements. Recruited from Caterpillar to be Ecolab’s first CISO, I successfully realigned security priorities with business objectives, obtained executive support, achieved quick-wins, restructured the team and recruited talent.
My proven ability to interact and communicate well with all levels of large organizations, including executive management and the Board of Directors, is a crucial skill. A large part of any risk management position is effective, courageous and measured communications.
Key skills and attributes include: Leadership Vision | Execution | Communication | Executive presence with Board of Directors of Fortune 50-500 companies | Teamwork | Courage | 20+ years of Information Security, Cyber Security , Product Security, Information Technology, Corporate Security, and Enterprise Risk Management leadership experience | International experience
Diego ZenginVP of Technology, Power ConstructionI am a global CIO and technology executive with 25 years of experience leading digital transformation across multinational organizations. I have worked in both family-owned and public companies with worldwide presence, building and leading multicultural, geographically distributed teams. Throughout my career, I have focused on creating opportunities for people while aligning technology, security, and data to business strategy. Today, as Vice President of Technology at Power Construction, I drive scalable growth and lasting technology impact.
George Wang, ModeratorCMO, Peterson Technology PartnersGeorge is a business technology leader with over 30 years’ experience in startup, mid-sized and Fortune 500 firms. As the Chief Marketing Officer at PTP, George is responsible for strategic growth, client relationships, and new business development. George was also a former CIO and COO with industry experiences in seven different verticals.
George has a BS in Computer Engineering from the University of Illinois Urbana-Champaign and a MS in Engineering Management from National Technological University. In addition to his work with PTP, George also serves on the board of SIM Chicago and volunteers for various non-profits, including I.C. Stars, Northeastern Illinois University Advisory Board, and Teen Innovators Board.
Panel Discussion
Richard HalmCybersecurity and Privacy Attorney, Clark Hill PLCRick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.
Al Zieba, ModeratorDirector of Global Network Security Platforms, McDonald'sAl Zieba is a customer-oriented and security focus IT leader with over 20+ years of experience in IT leadership across multiple verticals. He has worked in Financial Services, Software Development, Manufacturing and most recently the Retail Food sector. He grew up in Chicago, and is a DePaul "Double Demon" holding both a Bachelors of Science in Computer Science and a Masters Of Science in Telecommunications from DePaul University.
Panel Discussion
Shefali MookencherryCISO & Chief Privacy Officer, University of Illinois at ChicagoShefali is a seasoned professional with expertise in information security, privacy, higher education, HIPAA, research, healthcare policy and strategy, promoting Interoperability (PI), and compliance. With 20+ years of cybersecurity, privacy, and higher education experience—including 30+ years of healthcare experience. She is acknowledged as a cybersecurity and privacy subject matter expert (SME) and highly sought after for thought leadership opportunities. Shefali also has a keen interest in the adoption of innovative technology and provides leadership, consultation, coordination, and integration of information processes with enterprise-wide information technology and information security and privacy strategies.
Mike ZachmanCISO, Zebra TechnologiesI am a high-performing, globally-experienced executive with extensive information security, product security, enterprise risk management and information technology leadership experiences. I believe my unique blend of leadership positions across these disciplines has given me a well-rounded and results-oriented approach.
I have demonstrated proficiency in driving transformational change through leadership vision, collaboration and execution. Recruited to Zebra Technologies as Chief Security Officer (CSO), I am providing strategic leadership for Zebra's information security, product security, business continuity, and corporate security programs across the global enterprise. Previously, as Caterpillar’s first CISO, I rallied support from numerous stakeholders, created a shared vision, and built a new program with measurable improvements. Recruited from Caterpillar to be Ecolab’s first CISO, I successfully realigned security priorities with business objectives, obtained executive support, achieved quick-wins, restructured the team and recruited talent.
My proven ability to interact and communicate well with all levels of large organizations, including executive management and the Board of Directors, is a crucial skill. A large part of any risk management position is effective, courageous and measured communications.
Key skills and attributes include: Leadership Vision | Execution | Communication | Executive presence with Board of Directors of Fortune 50-500 companies | Teamwork | Courage | 20+ years of Information Security, Cyber Security , Product Security, Information Technology, Corporate Security, and Enterprise Risk Management leadership experience | International experience
Erik Hart, ModeratorCISO, Cushman & WakefieldErik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.
Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.







