Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 19, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageSr. Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmYour CEO just asked about AI security. Do you have a clear answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots. And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.What You’ll Master-
The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
-
Executive Translation — Turn technical AI risks into boardroom language
-
NIST AI RMF Implementation — Practical application, not theory
-
The $12M Question — Secure against deepfake fraud and AI-enabled attacks
-
Shadow AI Discovery — Find and govern the AI already in your organization
-
Business-First Security — Protect value, not just systems
Who Should AttendIdeal for:-
CISOs facing board questions about AI
-
Information Security Directors enabling digital transformation
-
IT VPs without dedicated security teams
-
Cybersecurity Consultants serving enterprise clients
-
Risk Managers governing AI initiatives
-
Aspiring decision makers and those reporting to one
Not designed for:-
Developers wanting to code AI models
-
Analysts seeking technical certifications
-
Anyone looking for hands-on hacking labs
What This Workshop Is (and Isn’t)This workshop is NOT about:-
Prompt injection techniques
-
Model architecture security
-
Technical vulnerability scanning
-
Writing 200-page policies
This workshop IS about:-
Speaking profit-and-loss to executives
-
Enabling your AI transformations
-
Building cybersecurity into AI from day one
-
Becoming the trusted AI advisor
What You’ll Leave With1. The Complete AIR-MAP Toolkit-
90-day implementation roadmap
-
Discovery templates and workflows
-
Risk scoring calculators
-
Executive presentation templates
2. Ready-to-Deploy Governance Assets-
AI Acceptable Use Policy (customize in minutes)
-
Vendor assessment questionnaires
-
Incident Response playbooks
3. A 30-Minute Strategy SessionA complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture. - Wednesday, May 20, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amThen and Now: Teaching Seniors How to Stay Safe OnlineFocus Areas: Security Awareness & Education; Strategic Communication & Storytelling; Human-Centric Security & AdvocacyExecutive Director, National Cybersecurity AllianceDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
8:00 am - 8:45 amThis interactive workshop equips security experts with tools to engage seniors with clear, empathetic communication about online safety. Using free custom-created resources, attendees will learn to teach without fear or jargon, and leverage analogies and storytelling. Come ready to gain skills that also translate to business settings, and any situation requiring communication with non-technical audiences.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The Strategic Security Debate: Defending the 'Least Bad' Decisions in a CrisisFocus Areas: Strategic Risk Leadership; Engineered Resilience & Response; National & Economic ResilienceVP, CISO, DeVry UniversityCISO, The Kraft Heinz CompanyDeputy CISO, Collective HealthRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIn the world of enterprise cybersecurity, there are rarely perfect solutions—only difficult trade-offs. Join us for an unscripted, high-energy session where top-tier security leaders face off on the industry’s toughest hypothetical scenarios.
Moderated in a rapid-fire game show format, our panelists will be presented with difficult “Would You Rather” choices ranging from ransomware negotiation dilemmas and crippling technical debt to extreme budget constraints and the “secure-by-default” friction that can stall business innovation. They won’t just pick a side; they have to defend it against a panel of their peers.
Attendees will gain a unique window into the strategic minds of seasoned CISOs, understanding how they weigh business continuity against forensic integrity, and rapid digital transformation against long-term risk management. Come ready to vote on who makes the best case for the “least bad” situation in an era where cybersecurity is a fundamental pillar of national and economic resilience.
9:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
10:15 amFrom Risk to Resilience: Engaging the Enterprise for Smarter SecurityFocus Areas: Enterprise Risk Management (ERM); Security Culture & Accountability; Business-Centric GRCVP, Security & Compliance, IMO HealthRegistration Level:
Conference Pass
10:15 am - 10:50 amRisk management isn’t just a compliance exercise—it’s a competitive advantage when done right. This session dives into how organizations can turn risk awareness into a shared responsibility across the enterprise, creating a culture where security and business goals work hand in hand.We’ll explore proven strategies for embedding risk practices into strategic planning, daily operations, and the software development lifecycle, while meeting requirements for frameworks like SOC 2 and HIPAA. Learn how to prioritize risks based on real business impact, involve key stakeholders in their assessment, and get buy-in from leadership to drive accountability. Join us to discover how to transform risk management into a proactive, business-enabling force that builds trust, transparency, and resilience.10:15 amData Security: The Missing ContextRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 am[Panel] Beyond the Red Line: Human Sustainability in the 24/7 Threat CycleFocus Areas: Mental Health & Burnout Prevention; Executive Resilience & Leadership; Psychological Risk & CultureCISO, City of Chicago, Department of Technology & InnovationSr. Director, Cybersecurity & Risk Management, Rich Products CorporationBoard Member, The Center for Critical Infrastructure Security (CCIS)Executive Director, Women in CyberSecurity (WiCyS)Registration Level:
Open Sessions
10:15 am - 10:50 amThis isn’t your typical leadership panel. In this candid, high-impact session, a group of senior cybersecurity leaders will step away from the dashboard to discuss the one metric they rarely report to the board: their own mental resilience. Moving beyond high-level platitudes, our panelists will openly share their personal “red line” moments—the times when the pressure of constant vigilance, regulatory accountability, and the 24/7 threat cycle became unsustainable. They will discuss the psychological toll of “imposter syndrome” in an AI-accelerated landscape and the heavy weight of the accountability-responsibility gap.
The discussion will pivot from struggles to solutions, exploring evidence-based protocols and strategic boundary-setting that allows them to lead effectively without losing themselves to the job.
10:50 amNetworking Break & Cyber ConnectLevel Up Your Cyber Game – Join this bonus session in the Networking HallDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallToday, good cyber skills are good life skills, and we’re here to put your mind through the motions! Join us in the networking lounge of the Networking Hall during the post-lunch keynote break for a turbocharged gameshow and test your abilities! We will engage you with thrilling challenges and strategic quandaries. Come for essential info and practical techniques to safeguard your digital life after the stadium lights have dimmed. This user-focused trivia game demonstrates how utilizing quick wits, tricky quandaries and fast thinking can engage your user audience to move the needle on keeping their digital lives (and your organization’s network) safer.
Along with the 15 or so scored questions, the game show hosts will discuss topics raised in each of the questions. We will also answer audience questions and provide insight on key behaviors. We will utilize a trivia platform that allows the audience to play along and see their score compared to other players in the game.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskHead of Security & Compliance, KinderCare Education LLCRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:10 am[Panel] Bridging the Gap: The Role of the BISO in Modern CybersecurityFocus Areas: Business Information Security Officer (BISO); Executive Alignment; Security Career PathsBISO, The Kraft Heinz CompanyBISO, Gallagher BassettRegistration Level:
Conference Pass
11:10 am - 11:45 amAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.11:10 amStopping Social Engineering Attacks Where They Start: ImpersonationRegistration Level:
Open Sessions
11:10 am - 11:45 amSession details to come.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] The Changing Dynamics of the Role of a CISO in the Age of AIFocus Areas: CISO Strategy; AI Governance and Ethics; Proactive Risk ManagementVP & Global CISO, HanesBrands Inc.Registration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterAs the role of CISO continues to evolve, several key trends are shaping the future responsibilities of individuals in this position and their teams:1. There is a noticeable trend towards increased scrutiny on the decision-making processes of CISOs. Stakeholders are placing a greater emphasis on understanding and evaluating the rationale behind cybersecurity strategies and actions.2. Ethical considerations in handling data breaches are becoming a focal point for CISOs. It is essential for CISOs to not only address breaches effectively but also to do so in an ethical manner that prioritizes the protection of individuals’ data and privacy.3. The landscape of regulations governing CISO roles may be shifting towards more stringent requirements. CISOs may need to navigate a complex web of compliance standards and regulations to ensure the organization’s cybersecurity practices align with legal expectations.4. Proactive cybersecurity measures are gaining importance within organizations. CISOs are expected to anticipate and mitigate potential threats before they materialize, rather than solely reacting to incidents after they occur.5. Building a culture of transparency and accountability within CISO teams is emerging as a critical focus area. CISOs are tasked with fostering an environment where team members feel empowered to raise concerns, share information, and take ownership of cybersecurity initiatives.Hear how CISOs and their teams can navigate the new age of cybersecurity, one that is continually evolving.12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Achieving True Resilience in the AI EraCISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmIn the cybersecurity arena, AI technology presents new possibilities for both defenders and attackers. The key to withstanding the next evolution of cyber threats? A resilient identity infrastructure.
Whether your organization uses a specific vendor tool or runs a mix of systems and solutions, identity is your digital foundation of trust. If identity is compromised, your organization’s ability to operate is at risk.
Join this closed-door, invitation-only, peer-to-peer discussion to learn insights and practical strategies for building your identity, cyber, and business resilience. This open forum exchange explores:
- What does it take to plan for true cyber resilience?
- What happens when your identity infrastructure is under attack?
- How do you manage the complexities of a hybrid identity environment?
- How can security, identity, IT, and business leaders work together to ensure resilience across the entire cyber lifecycle?
12:45 pmNetworking Break & Cyber ConnectThe Adversarial Advantage: Applying a 'Hacker Mindset' to Governance and AICybersecurity Engineer & Board Leader, ISACA Milwaukee, ISC2 Wisconsin, WiCyS WisconsinRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallTraditional governance often slows innovation, but a “hacker mindset” can accelerate it. This discussion explores how viewing your data and AI pipelines through an adversarial lens identifies blind spots before attackers do. Drawing from nearly a decade of technical experience and regional leadership at ISC2, ISACA, and WiCyS, Nousheen Begum will demonstrate how “Red Team” tactics like CTF principles can transform passive compliance into active defense. Learn to build a culture of healthy paranoia that empowers your team to innovate safely and stay resilient in the face of evolving threats.
1:15 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] The Talent Equation: Reimagining Recruitment and Retention in CybersecurityFocus Areas: Workforce Development & Retention; Cyber Leadership & Culture; Talent Acquisition & Strategic HiringDirector of Strategic Innovation, Evolve ProjectCISO, Zebra TechnologiesVP of Technology, Power ConstructionCMO, Peterson Technology PartnersRegistration Level:
Open Sessions
1:15 pm - 1:50 pmThe cybersecurity industry faces a persistent paradox: while the demand for skilled professionals has never been higher, the traditional pathways for finding and keeping them are increasingly falling short. In a landscape defined by rapid technological shifts and high-stakes pressure, the “talent gap” is no longer just a numbers game—it is a strategic challenge that requires a fundamental rethink of how we value and support the human element of security.This panel brings together industry veterans, talent strategists, and organizational leaders to dissect the evolving mechanics of the cyber labor market. Moving beyond standard hiring checklists, the discussion will focus on creating a sustainable ecosystem where professionals can thrive, grow, and remain engaged for the long term.1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceHead of IT & Security, Pritzker GroupRegistration Level:
Open Sessions
1:15 pm - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber Connect:Agents Awake: The AI Trivia Challenge — What’s Keeping You Up at Night?Principal Cybersecurity Architect, Cummins Inc.Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallPut your knowledge of the AI landscape to the ultimate test in this high-octane trivia battle that separates “agentic” reality from the latest marketing hype. From Shadow AI discovery and LLM vulnerabilities to the most infamous deepfake disasters, we’ll explore the technical and strategic dilemmas keeping the industry awake at night. Bring your sharpest wits and a dose of “healthy paranoia” to see if you can survive the challenge and claim the title of AI Orchestrator.
2:10 pmHow to Make Cyber Insurance an Ally in Incident ResponseFocus Areas: InsurSec; Risk Management & Financial Recovery; Incident Readiness & Policy ComplianceCybersecurity and Privacy Attorney, Clark Hill PLCRegistration Level:
Conference Pass
2:10 pm - 2:45 pmMost cybersecurity professionals know cyber insurance only through the annoyingly long questionnaires. But how can you use cyber insurance as an ally during an incident? How can you work with them to make sure that they cover your loss from an incident?
2:10 pmBuilding an AI-First Center of Excellence: From Legacy Transformation to Enterprise-Wide CapabilityFocus Areas: AI Governance & Risk Management; AI-Native Security Operations; Enterprise AI Strategy & CultureChief Transformation Officer, Old National BankTransformation Office Director, Old National BankRegistration Level:
Conference Pass
2:10 pm - 2:45 pmThis session explores our journey establishing an AI Center of Excellence that addresses the full spectrum of AI transformation: vision, governance, culture, capabilities, and enablement. Attendees will learn how we’re building AI-native operations while maintaining the rigorous risk management and regulatory compliance essential to financial services.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityDirector of Global Network Security Platforms, McDonald'sRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask Us Anything! A Live Conversation with Security LeadersFocus Areas: Leadership, Decision Making, CommunicationCISO & Chief Privacy Officer, University of Illinois at ChicagoVP of Security / Security Officer, MedecisionCISO, Zebra TechnologiesCISO, Cushman & WakefieldRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterIn an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.
This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.
Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.
Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.
3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- AppOmniBooth: TBD
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- Black DuckBooth: TBD
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
- BrinqaBooth: TBD
Make security chaos work for you with AI-powered Exposure Management, built on data. The Brinqa platform delivers scalable, AI-driven exposure management that unifies every data source for a complete picture of risk. Separate false alarms from real risk by uniting Security and IT, accelerating remediation, and delivering a single, trusted source of truth for the business.
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Chicago CISO of the YearBooth: TBD
The current business climate has seen an unprecedented number of cybersecurity related headlines. Hackers to Nation State actors have been shown to be constantly probing Organizations defenses with the intent to break in, disrupt operations, monetize information, and steal intellectual property. Between these threats and the increasing regulatory climate, never has the Chief Information Security Officer (CISO) been asked to navigate more difficult terrain.
Originally patterned after the Chief Information Officer (CIO) of the Year Award sponsored by the Association of Information Technology Professionals (AITP Chicago), SIM-Chicago and the Executive Club of Chicago, this program seeks to recognize outstanding CISOs for the contributions they make to their organizations, the Information Security profession and the local community. The award process is overseen by the Chicago CISO of the Year Program, which is a not-for-profit affiliated with AITP Chicago and managed by local area security leader volunteers.
- CofenseBooth: TBD
Cofense® is the original and leading provider of security awareness training and email phishing simulation, offering global enterprise-level advanced email threat detection and remediation solutions. Cofense PhishMe® and Cofense Phishing Detection and Response (PDR) offer the world’s only platforms to leverage over 35 million Cofense-trained employees who actively report suspected phishing and other dangerous email threats in real-time. Exclusive only to Cofense, this reporting system ingests and catalogs thousands of threats per day that are missed by current email gateway technologies and then eradicates those threats from customer inboxes. In short, Cofense sees and stops threats other email security systems miss. Please visit www.cofense.com or connect with us on X and LinkedIn for additional information.
- Concentric AIBooth: TBD
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- Imper.aiBooth: TBD
imper.ai prevents AI-driven impersonation and social engineering by analyzing the device, network, and behavioral signals attackers can’t fake. Its real-time risk scoring and automated blocking verify every participant across voice, video, and chat before trust is established.
- InfraGard ChicagoBooth: TBD
All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.
The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.
- ISACA Chicago ChapterBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.
Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)
Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.
- ISC2 Chicago ChapterBooth: TBD
The mission of the Chicago Chapter is to advance the local Chicagoland information security community by providing its members with opportunities to increase knowledge, grow professional networks, share information and advance the profession as a whole by promoting certification, ethical behavior, and social responsibility.
Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification. Our chapter program is focused on sharing knowledge and exchanging ideas among security professionals in the local area. Ultimately, we want to advance the field of information security by educating practitioners and the public at large on how to protect and defend against security threats.
- ISSA Chicago ChapterBooth: TBD
The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.
Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- OWASP ChicagoBooth: TBD
The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. Our programming includes:
- Community-led open source projects including code, documentation, and standards
- Over 250+ local chapters worldwide
- Tens of thousands of members
- Industry-leading educational and training conferences
We are an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security.
- Seceon Inc.Booth: TBD
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.
What Sets Seceon Apart:
- Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
- AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
- Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
- Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.
Why Organizations Choose Seceon:- Cut cybersecurity costs by 60% by replacing siloed tools
- Stop threats faster with AI-powered detection and automated response.
- Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.
Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- SemperisBooth: TBD
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- Splunk, a Cisco CompanyBooth: TBD
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS Chicago AffiliateBooth: TBD
WiCyS is a global community of over 11,000 women and allies dedicated to recruit, retain, and advance women in cybersecurity. We have 72 professional affiliates and over 300 student chapters in over 100 countries. WiCyS stands as the nonprofit organization that creates accessibility and opportunities for the cybersecurity workforce. With many initiatives and programming efforts, we continue to pave paths for many to get into cybersecurity and advance because of it. Our strategic partners, philanthropic funders, and conference sponsors are the foundation for making this happen.
- Zafran SecurityBooth: TBD
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Rodney Beard, CISSP - InstructorSr. Cyber Risk Analyst, Cyber Risk Opportunities LLCRodney Beard, CISSP, is a cybersecurity consultant with Cyber Risk Opportunities LLC, bringing more than 20 years of experience protecting organizations across defense, government, and financial services sectors.
Most recently, Rodney served as Information Security Officer at Rivermark Community Credit Union, a $2B institution in Oregon, where he built and led the enterprise security program for seven years. His responsibilities included penetration testing, security architecture, incident response, vendor risk management, and developing security awareness training for employees.
Prior to financial services, Rodney spent eight years as an IT Specialist with the U.S. Army at White Sands Missile Range, where he served as Information Management Officer responsible for IT security across 22 regional locations and 250 employees. He implemented security policies aligned with NIST, Federal, and DoD standards while managing a program portfolio valued at $2.5 million.
Rodney has also taught technology courses as an Adjunct Instructor at Vista College, preparing students for CompTIA A+ and Network+ certifications.
He holds the CISSP certification, CompTIA Security+, Network+, and A+, along with multiple Microsoft certifications. Rodney is based in Casper, Wyoming, and works remotely with clients nationwide.
Lisa PlaggemierExecutive Director, National Cybersecurity AllianceLisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Dr. Fred KwongVP, CISO, DeVry UniversityDr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security Officer. He is a member of several advisory boards and is a frequent speaker at national security forums on cyber security and information technology and is often asked to consult on matters of security and leadership
Fred also serves as an adjunct faculty member at Roosevelt and Benedictine Universities. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his Doctorate in organization development from Benedictine University. Fred has earned several certifications including the CISSP, CISA, CISM, CDPE, PCIP, PMP and ITILv3f.
Ricardo LafosseCISO, The Kraft Heinz CompanyRicardo Lafosse is responsible for IT risk governance, software and product security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security topics at global conferences, including Defcon, MirCon, and ISACA CACS. Lafosse has more than 15 years of experience in information security for the government, finance, legal, and healthcare. Lafosse holds a Master’s in Information Assurance from the Iowa State University. He also holds the Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) designations.
Arpine Long, ModeratorDeputy CISO, Collective Health
Lori KevinVP, Security & Compliance, IMO HealthA cybersecurity and compliance executive with a passion for building resilient organizations through strategic risk management, governance, and security leadership. I lead enterprise security and compliance programs that protect critical assets, ensure regulatory alignment, and enable business resilience. With over 20 years of experience in cybersecurity, I specialize in translating complex risk landscapes into actionable strategies that drive trust and performance. My focus is on building strong security cultures, aligning governance with business goals, and mentoring the next generation of security leaders.
Concentric AI Representative
Bruce CoffingCISO, City of Chicago, Department of Technology & InnovationBruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank of America and was a Senior Manager at consulting firm Accenture. Mr. Coffing holds the Certified Information Systems Security Professional (CISSP) certification.
Joe MariscalSr. Director, Cybersecurity & Risk Management, Rich Products CorporationHead of Cybersecurity, 20+ years in InfoSec/Cyber. MBA, Masters in Cyber, CISSP, CISM.
Troy StairwaltBoard Member, The Center for Critical Infrastructure Security (CCIS)Technology executive with 25+ years of experience leading AI-enabled, secure, and resilient digital transformation across enterprise IT, cloud platforms, and digital-physical critical infrastructure. Proven ability to align innovation with governance, risk, and operational continuity in highly regulated and high-impact environments.
Troy’s career reflects a full-spectrum technology leadership journey, progressing from hands-on engineering, architecture, and cyber forensics roles to senior executive positions including Board Member, Director, Vice President, and 4 times as Chief Information Security Officer (CISO). This end-to-end perspective enables him to translate complex technical realities into executive-level strategy, board-ready risk decisions, and measurable business outcomes.
Committed to empowering others and giving back to the profession, Troy volunteered for several years with internationally recognized experts to author, review, and refine global certification exam content for ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) programs. This work required maintaining technology, cultural, and regulatory neutrality for a worldwide audience. He has also served as a mentor for SANS 504: Hacking Techniques, Exploits, and Incident Handling, supporting the development of advanced incident response practitioners.
Troy currently serves as adjunct faculty at the University of Akron, teaching graduate-level (454 & 554) courses in cybersecurity and information systems auditing within the university’s STEM-accredited program, helping prepare the next generation of technology and risk leaders.
His professional credentials reflect executive-level breadth across AI, cloud, privacy, cyber-physical systems, governance, and incident response, including advanced training in ICS / SCADA cybersecurity from Idaho National Laboratory and defensible security architecture and engineering.
• ICS / SCADA Cybersecurity – DoD, Idaho National Laboratory (2024)
• SEC530: Defensible Security Architecture & Engineering
• Certified Chief Information Security Officer (CCISO)
• Certified Information Systems Security Professional (CISSP)
• Certified Information Security Manager (CISM)
• Certified in Risk and Information Systems Control (CRISC)
• Certified Information Systems Auditor (CISA)
• Certified Cloud Security Professional (CCSP)
• Certified Data Privacy Solutions Engineer (CDPSE)
• Insider Threat Program Manager (ITPM) Certified via CMU – SEI
• GIAC Certified Incident Handler (GCIH) SANS 504
Lynn Dohm, ModeratorExecutive Director, Women in CyberSecurity (WiCyS)Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Sean Ventura, ModeratorHead of Security & Compliance, KinderCare Education LLCSean has over three decades of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Head of Information Security and Compliance at KinderCare, one of the nation’s largest accredited early learning education systems, implementing and maintaining the company’s security and compliance Prior to KinderCare, Sean Served as the Chief Information Security Officer, at Atmosera, providing security and compliance expert advisory to Atmosera’s clientele. He brings extensive experience in lean team management within infrastructure and security business units, providing a reliable and secure environment across a wide range of regulatory and legal frameworks. Sean has held progressively more senior roles with ESCO one the world’s largest steel manufacturer of ground engagement equipment, Gogo Air, providing security advisory and design for all the commercial wireless services, DDB/Omnicom, a worldwide marketing communications firm, as well as financial institutions, and national retail chains.
Panel Discussion
Sarah BuergerBISO, The Kraft Heinz CompanySarah Buerger serves as the Business Information Security Officer for The Kraft Heinz Company.
Ed YousfiBISO, Gallagher BassettEd is the Business Information Security Officer for Gallagher Bassett and Global Head of Third Party Risk Management for Gallagher. He is an accomplished leader with over 20 years of experience in information security and IT GRC. He has built cybersecurity programs with emphasis on IT risk management, vulnerability management, third party risk , and IT governance. Ed has worked primarily in financial services, retail, and health care for multiple global companies.
imper.ai Representative
John Opala, PhDVP & Global CISO, HanesBrands Inc.Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and emerging technologies globally.
Currently serving as the Vice President of IT and Global Chief Information Security Officer (CISO) for Hanes Brands Inc., Dr. Opala leads efforts to strengthen the company’s cybersecurity posture against evolving threats. Prior to this role, he was Vice President of IT and Global Chief Information Security Officer (CISO) at McCormick, where he transformed cybersecurity risk remediation and response strategies to enhance network security globally.
In addition to his corporate achievements, Dr. Opala is deeply engaged in academia. As an adjunct professor, he has taught a variety of cybersecurity and business risk-related courses, including certified ethical hacking, information security risk management, digital forensics, and business ethics. He is currently developing program curricula focused on responsive AI usage. His dedication to education is further exemplified by his numerous publications on topics such as cloud architecture, cybersecurity risk governance, and the impact of cyber warfare on enterprise networks. His work has been featured in respected journals like the International Journal of Computer Networks and Communications and presented at IEEE conferences, among others.
Dr. Opala earned a Ph.D. in Information Technology with a specialization in Information Security Assurance & Governance from Capella University. Continuously striving for excellence, he is currently pursuing further education in Business Management at Harvard University Extension School.
Driven by a passion for innovation and knowledge, Dr. Opala focuses his research on information security, cloud computing, enterprise architecture, data analytics, big data and now AI. His exploratory analyses on the influence of information security on cloud adoption and the governance of cybersecurity risks have garnered widespread recognition.Through his leadership, scholarship, and teaching, Dr. Omondi John Opala has become a prominent figure in the fields of cybersecurity and information technology, inspiring both industry professionals and aspiring technologists.
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Nousheen BegumCybersecurity Engineer & Board Leader, ISACA Milwaukee, ISC2 Wisconsin, WiCyS WisconsinNousheen Begum, MS, CISSP, is a Cybersecurity Engineer with nine years of experience in security architecture and regional leadership. She holds a Master’s in Cybersecurity and serves as the Vice President for WiCyS Wisconsin, Membership Chair for ISC2 Wisconsin, and a board member for ISACA Milwaukee. A passionate advocate for mentorship and cognitive diversity, Nousheen leverages her background in competitive Capture The Flag (CTF) to help organizations build resilient, threat-aware cultures. She is dedicated to advancing the Wisconsin cyber ecosystem through technical expertise and community advocacy.
Brian PichmanDirector of Strategic Innovation, Evolve Project
Mike ZachmanCISO, Zebra TechnologiesI am a high-performing, globally-experienced executive with extensive information security, product security, enterprise risk management and information technology leadership experiences. I believe my unique blend of leadership positions across these disciplines has given me a well-rounded and results-oriented approach.
I have demonstrated proficiency in driving transformational change through leadership vision, collaboration and execution. Recruited to Zebra Technologies as Chief Security Officer (CSO), I am providing strategic leadership for Zebra's information security, product security, business continuity, and corporate security programs across the global enterprise. Previously, as Caterpillar’s first CISO, I rallied support from numerous stakeholders, created a shared vision, and built a new program with measurable improvements. Recruited from Caterpillar to be Ecolab’s first CISO, I successfully realigned security priorities with business objectives, obtained executive support, achieved quick-wins, restructured the team and recruited talent.
My proven ability to interact and communicate well with all levels of large organizations, including executive management and the Board of Directors, is a crucial skill. A large part of any risk management position is effective, courageous and measured communications.
Key skills and attributes include: Leadership Vision | Execution | Communication | Executive presence with Board of Directors of Fortune 50-500 companies | Teamwork | Courage | 20+ years of Information Security, Cyber Security , Product Security, Information Technology, Corporate Security, and Enterprise Risk Management leadership experience | International experience
Diego ZenginVP of Technology, Power ConstructionI am a global CIO and technology executive with 25 years of experience leading digital transformation across multinational organizations. I have worked in both family-owned and public companies with worldwide presence, building and leading multicultural, geographically distributed teams. Throughout my career, I have focused on creating opportunities for people while aligning technology, security, and data to business strategy. Today, as Vice President of Technology at Power Construction, I drive scalable growth and lasting technology impact.
George Wang, ModeratorCMO, Peterson Technology PartnersGeorge is a business technology leader with over 30 years’ experience in startup, mid-sized and Fortune 500 firms. As the Chief Marketing Officer at PTP, George is responsible for strategic growth, client relationships, and new business development. George was also a former CIO and COO with industry experiences in seven different verticals.
George has a BS in Computer Engineering from the University of Illinois Urbana-Champaign and a MS in Engineering Management from National Technological University. In addition to his work with PTP, George also serves on the board of SIM Chicago and volunteers for various non-profits, including I.C. Stars, Northeastern Illinois University Advisory Board, and Teen Innovators Board.
Ravi Bhatarai, ModeratorHead of IT & Security, Pritzker GroupWith more than 15 years of leadership experience, Ravi brings deep technical expertise in IT, security, and cloud transformation, aligning technology initiatives with business strategy, operational resilience, and risk management.
Ravi’s industry experience spans private equity, venture capital, manufacturing, and Fortune 500 organizations. He is known for applying technology thoughtfully to drive measurable business value while strengthening cybersecurity posture and enterprise governance. His cross-industry perspective allows him to bridge the gap between technical execution and board-level oversight of risk and innovation.
Ravi was named a 2025 Chicago CISO of the Year Nominee in recognition of his leadership and contributions to the cybersecurity community. He also serves in board and advisory roles with Rockford University, the Global Cybersecurity Initiative, and Techlink Africa, supporting education, industry collaboration, and global cyber advancement.
Panel Discussion
Sankarasubramaniam ChockalingamPrincipal Cybersecurity Architect, Cummins Inc.Sankar Chockalingam is a seasoned Cybersecurity Architect with more than 20 years of extensive experience designing and implementing cutting-edge security solutions across diverse technologies. His career spans roles in enterprise security architecture, threat management, and regulatory compliance, where he has consistently led initiatives to fortify digital infrastructures and reduce organizational risk.
Currently, he is expanding his expertise into Generative AI and Agentic AI, exploring their transformative potential in enterprise environments.
Richard HalmCybersecurity and Privacy Attorney, Clark Hill PLCRick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.
Dan FlaniganChief Transformation Officer, Old National BankDan Flaningan leads the Transformation Office at Old National Bank, architecting enterprise-wide innovation capabilities including the AI Development Lifecycle (DLC) model utilizing spec-driven development methodology, and shaping agentic AI systems for enterprise-grade deployments. His work establishes standardized frameworks and governance structures that accelerate AI solution delivery while ensuring enterprise-grade quality and compliance through specification-first design approaches. Previously, Dan served as Chief Product and Innovation Officer at Bremer Financial Corporation. He holds a bachelor's degree in chemistry from Case Western Reserve University and an MBA from Youngstown State University.
Meredith WinegarTransformation Office Director, Old National BankMeredith Winegar leads enterprise AI transformation at Old National Bank, one of the top 25 U.S. banking companies with approximately $71 billion in assets. As Transformation Office Director, she established the bank's AI Center of Excellence in 2025, building comprehensive AI capability through a five-pillar framework: Vision, Governance, Culture, Capabilities, and Enablement.
With over two decades of distinguished leadership in banking, Meredith Winegar offers a comprehensive and unique 360-degree perspective on organizational change. Her expertise spans transformation, strategy, and diverse business lines, including Mortgage, Trust, Insurance, and Wealth Management. This extensive experience is coupled with a profound understanding of regulatory and compliance requirements, technological advancements, operational insights, and leadership in enterprise transformation. She previously led digital banking transformation at Bremer Bank, driving platform modernization and fraud reduction strategies.
Meredith addresses the critical industry challenge: while 60% of banking processes can be transformed by AI, the industry sees only 1% adoption. Her work focuses on operationalizing AI strategy, building AI fluency across organizations, and establishing governance frameworks that enable innovation while maintaining rigorous risk management.
A recognized speaker on AI transformation and embedded finance, Meredith has presented at a variety of events including most recently ChiBrrCon and Lend360 discussing the future of banking. She is based in St. Paul, Minnesota.
Al Zieba, ModeratorDirector of Global Network Security Platforms, McDonald'sAl Zieba is a customer-oriented and security focus IT leader with over 20+ years of experience in IT leadership across multiple verticals. He has worked in Financial Services, Software Development, Manufacturing and most recently the Retail Food sector. He grew up in Chicago, and is a DePaul "Double Demon" holding both a Bachelors of Science in Computer Science and a Masters Of Science in Telecommunications from DePaul University.
Panel Discussion
Shefali MookencherryCISO & Chief Privacy Officer, University of Illinois at ChicagoShefali is a seasoned professional with expertise in information security, privacy, higher education, HIPAA, research, healthcare policy and strategy, promoting Interoperability (PI), and compliance. With 20+ years of cybersecurity, privacy, and higher education experience—including 30+ years of healthcare experience. She is acknowledged as a cybersecurity and privacy subject matter expert (SME) and highly sought after for thought leadership opportunities. Shefali also has a keen interest in the adoption of innovative technology and provides leadership, consultation, coordination, and integration of information processes with enterprise-wide information technology and information security and privacy strategies.
Pamela NigroVP of Security / Security Officer, MedecisionPamela Nigro is a leading voice in cybersecurity and IT governance, recognized for her strategic vision and unwavering commitment to protecting critical information. Named one of Security Magazine's Top Cybersecurity Leaders, she currently serves as VP of Security and Security Officer at Medecision, where she oversees comprehensive cybersecurity operations, threat detection, and protocol development. With over 25 years of experience, Pamela brings a wealth of knowledge from diverse roles, including her tenure as Chair of the ISACA Board, where she shaped the global IT governance landscape.
Her experience spans diverse industries, from leading digital transformation and achieving HITRUST certification at Home Access Health Corporation (HAHC), to pioneering automated IT controls and integrating Agile/DevSecOps at Health Care Service Corporation (HCSC). Pamela's deep understanding of compliance frameworks, including HIPAA, HITRUST, SOC 1/2, and SOx (NAIC-MAR), is rooted in her early career at PwC. Beyond her corporate leadership, Pamela is dedicated to educating the next generation of security professionals as an Adjunct Professor at Lewis University, and through her active involvement in ISACA's SheLeadsTech. A sought-after speaker, author, and "Distinguished Toastmaster," Pamela shares her expertise at major industry conferences and in leading publications, continuously elevating the cybersecurity profession.
Mike ZachmanCISO, Zebra TechnologiesI am a high-performing, globally-experienced executive with extensive information security, product security, enterprise risk management and information technology leadership experiences. I believe my unique blend of leadership positions across these disciplines has given me a well-rounded and results-oriented approach.
I have demonstrated proficiency in driving transformational change through leadership vision, collaboration and execution. Recruited to Zebra Technologies as Chief Security Officer (CSO), I am providing strategic leadership for Zebra's information security, product security, business continuity, and corporate security programs across the global enterprise. Previously, as Caterpillar’s first CISO, I rallied support from numerous stakeholders, created a shared vision, and built a new program with measurable improvements. Recruited from Caterpillar to be Ecolab’s first CISO, I successfully realigned security priorities with business objectives, obtained executive support, achieved quick-wins, restructured the team and recruited talent.
My proven ability to interact and communicate well with all levels of large organizations, including executive management and the Board of Directors, is a crucial skill. A large part of any risk management position is effective, courageous and measured communications.
Key skills and attributes include: Leadership Vision | Execution | Communication | Executive presence with Board of Directors of Fortune 50-500 companies | Teamwork | Courage | 20+ years of Information Security, Cyber Security , Product Security, Information Technology, Corporate Security, and Enterprise Risk Management leadership experience | International experience
Erik Hart, ModeratorCISO, Cushman & WakefieldErik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.
Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.







