Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 19, 2022
    9:00 am
    [PLUS Course] How to Implement NIST CSF in Your Company
    • session level icon
    speaker photo
    Founder & President, Praevalidis
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Attendees are eligible to receive 12 CPE credits (including 6 CPEs from the Conference Pass).

    The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is a flexible, comprehensive tool for organizations to communicate cyber security needs, actions, and benefits across the different areas of an organization. While not a strict set of rules and guidelines, the CSF allows organizations to better understand the needs of cyber security to reduce information risk within their various departments, and create a holistic and workable cybersecurity construct tailored for ever-changing needs of the organization. 

    In this 6-hour SecureWorld PLUS course, we will identify the parts of the NIST CSF, understand how the framework works to benefit the organization, and deep dive how to implement the CSF.   

    The NIST Framework for Improving Critical Infrastructure Cybersecurity (also called Cybersecurity Framework, Framework, or CSF) was released in February 2014 after extensive public engagement and collaboration. The Framework serves as a prominent resource to manage cybersecurity risks holistically across an organization. It has been downloaded over 1.7 million times and is used by organizations of varying sectors, sizes, and locations. It has been adopted internationally, with the English version complemented by nine translations. The CSF was intended to be a living document that is refined, improved, and evolves over time to keep pace with technology and threat trends, integrate lessons learned, and move best practice to common practice. NIST updated the Framework in April 2018 with CSF 1.1. Based on the RFI responses, and in order to keep pace with the ever-evolving cybersecurity landscape and to help organizations more easily and effectively manage cybersecurity risk, NIST is planning a new update to the Framework.  

    Part 1 – 90 minutes
    The CSF overview 

    Part 2  – 90 minutes
    Customizing the CSF: Not your father’s compliance program 

    Part 3  – 90+minutes
    Implementing the CSF: A grass-roots approach 

  • Thursday, October 20, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am

    Participating professional associations and details to be announced.

    9:00 am
    [Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    speaker photo
    Special Agent in Charge, Dallas Field Office District, United States Secret Service
    speaker photo
    Network Intrusion Forensic Analyst (NIFA), United States Secret Service
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:15 am
    Cyber Risk Governance: The Hype, Hope, and Harsh Reality!
    • session level icon
    speaker photo
    VP, Information Security & CISO, Texas Mutual Insurance Company
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Cyber Risk Governance has been an often talked about concept yet remains one of the most elusive and sought-after outcomes by every C-level executive across every line of business in every industry sector and particularly in the Board room. In this session, we are going to jump into the shoes of the C-level executives and Board members as we describe “what they want” and how we achieve the visual representation of cyber risk in a way that is easily consumable in a language that is universally understood.
    10:15 am
    Supply Chain Attacks Evolve. How Will Your Org Keep Up and Protect Itself?
    • session level icon
    speaker photo
    Director, Sales Engineering, SecureLink
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    SolarWinds. Colonial Pipeline. Kaseya. Codecov. Log4j. The one thing they all have in common is the fact that they were victims of high-profile supply chain attacks over the past year. That’s because attacks by third parties—including both contracted vendors and unknown outside attackers—are on the rise across industries. And with the Russia-Ukraine crisis rapidly unfolding, these kinds of attacks, many of which have been led by Russian hackers, take on a whole new meaning.

    If the supply chain attacks of 2021 have taught us anything, it’s that successful data security is not just about who you keep out; it’s about who you let in. For organizations to operate successfully, it’s essential they keep sensitive data secure while also being able to access and share it with key vendors, partners and other strategic third parties. However, third-party access is one of the top attack vectors used in recent breaches, and half of organizations have experienced a data breach caused by a third party.  

    Zero Trust has also become one of the biggest buzzwords in cybersecurity. It encourages the implementation of strong controls, methods, and protocols surrounding access to critical systems and data. Now more than ever, Zero Trust is a security must as remote and distributed workforces rely heavily on remote access methods while facing some of the most sophisticated cyber attacks in history. 

    The effectiveness of hackers using third parties to infiltrate internal networks combined with rising cyber threats from Russia continue to threaten critical infrastructure systems. And the only way to mitigate these threats is by regularly assessing and securing all points of access. In this session, Russell Dowdell, discusses how to identify a third-party threat and why critical access management must be a priority for security departments. He’ll also share practical advice for putting protective procedures in place and what organizations must do now to guard against the next supply chain attack. 

    10:15 am
    Back to Interview Basics, Really?
    • session level icon
    speaker photo
    Vice President, (ISC)2 Dallas-Ft. Worth
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    This session is designed to be a unique hands-on experience, engaging the audience in a dialogue of best and worst ideas, practices, and methods of virtual interviewing. With the use of a simulated virtual interview, the audience (in-person/virtual) will have an opportunity to provide live feedback.

    The (ISC)2 Dallas-Ft. Worth Chapter Executive Board has spoken to countless Job Seekers, Hiring Managers, Executive Recruiters. and Hiring Firms, confirming (despite the newly adopted virtual onboarding process) that interviewees and interviewers are using traditional interview techniques. Living in a time where virtual onboarding is now a “thing,” we must arm our cybersecurity community with tools to apply a hybrid approach when interviewing.

    This session is intended for all who have been challenged with virtual interviewing for security careers. The techniques presented in this session will consist of a hybrid of methodologies compiled from skilled job seekers, hiring managers, career trainers, and executive recruiters.

    11:10 am
    Establishing the Core of an Effective Technology Risk Management Program
    • session level icon
    speaker photo
    Director, Security Development & Engineering, Charles Schwab
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    A strong core makes risk management easy. Amna will outline an approach to establishing the core of a Technology Risk Management program to reduce overhead on risk management teams as well as control owners and provide ability to demonstrate real time compliance.
    11:10 am
    [Panel] Cloud: Doing More with Less
    • session level icon
    speaker photo
    Principal Solutions Architect, Expel
    speaker photo
    Co-Founder & CEO, accSenSe
    speaker photo
    Director, Systems Engineering, Code42
    speaker photo
    CISO, FUTU US Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 pm

    The cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.

    11:10 am
    Ransomware: The New Cold Ware
    • session level icon
    speaker photo
    Cyber Security Specialist, Infoblox
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In this session, you will learn the motivations and drivers behind ransomware attacks and gangs. You will walk through a real-world scenario where we will build a ransomware campaign and explore the economic ins and outs of how the industry works. This exploration will cover all aspects of the economics of the ransomware industry from how to build a campaign, who builds the tools, some understanding of why they do it, and what is fueling the entire industry.

    12:00 pm
    [Lunch Keynote Panel] The CISO Perspective
    • session level icon
    speaker photo
    VP & CISO, National Veterinary Associates
    speaker photo
    VP, Global GRC & BISO, CBRE
    speaker photo
    Principal, Teknion Data Solutions
    speaker photo
    CISO & Computerworld Premier 100 Leader
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Our panel of experienced security executives provide their views on what it takes to be a CISO, what they look for in security team members, and what they love about what they do (and what they hate) in this open exchange. They will answer these questions and more:

    • What are some things that you did in your first 90 days as CISO?
    • What framework did you select to base your program on and why?
    • What are some high-level considerations that you believe influenced your strategy?
    • What compliance challenges do you anticipate in the coming year?
    • What resources do you use to find qualified candidates?
    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite Only)
    • session level icon
    Reporting to the Board from an InfoSec POV
    speaker photo
    VP, Information Security & CISO, Texas Mutual Insurance Company
    speaker photo
    Sr. Information Systems Auditor, Parkland Health & Hospital System
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Roundtable discussion moderated by John Sapp and Michael Smith. For Advisory Council members only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    Negotiating Data Processing Terms
    • session level icon
    speaker photo
    Managing Partner, Scott & Scott, LLP
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    1:15 pm
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    CTO, ForgeRock
    speaker photo
    VP, Forensic Investigations, SecurityMetrics
    speaker photo
    Solutions Engineer, Cybereason
    speaker photo
    DFIR Principal Consultant, Avertium
    speaker photo
    Partner, IT Advisory, Weaver
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    2:30 pm
    Using NIST or CIS to Build a Risk-Based Security Program
    • session level icon
    speaker photo
    CISO, Dallas Independent School District
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Learning objectives:

    1) Framework efficacy analysis, adoption, and selection
    2) The Gap Assessment (people processes and technology)
    3) Leveraging the Risk Register to create the roadmap
    4) Creating an executive/BOD narrative to secure funding
    5) Remediation prioritization and risk reduction
    6) Use cases for SASE and Zero Trust
    7) Confirmation indicators of a risk-based approach
    8) Lessons learned and suggestions for continued success

    2:30 pm
    Your Critical Data and Information Are Calling. They Want Your Security Back!
    • session level icon
    speaker photo
    Principal Solutions Architect, Thales
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    Securing critical data and information was where this industry started a long time ago but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and exposed critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. Thanks to the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protect your most critical data and information.

    2:30 pm
    [Panel] Incident Response!
    • session level icon
    speaker photo
    Chief Operating Officer, Binary Defense
    speaker photo
    Staff Security Engineer, Fastly
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    Security teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [Closing Panel] Cover Your Cyber Assets
    • session level icon
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    speaker photo
    Director, Cyber Underwriting, Safety National
    speaker photo
    Consultant, Cyber Risk Solutions Team, WTW
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    What will drive the next big wave of information security improvements at U.S. organizations? Instead of regulation, it may be insurance. A two-pronged evolution is underway. Insurance policies are suddenly becoming more prescriptive for organizations, often requiring companies meet certain cybersecurity benchmarks before a policy can be written. At the same time, “InsureTech” is emerging on the scene. This involves a new breed of insurance company that provides cyber coverage and also scans the insured’s environment to constantly monitor for IT and cyber risk. Join this keynote panel as we discuss this evolution and look at future impacts of cyber insurance on security leaders and their teams.
Exhibitors
  • Association of Continuity Professionals (ACP) North Texas
    Booth:

    ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.

    Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week.  We invite you to attend our next meeting.

  • accSenSe
    Booth:

    Digital Identity Resilience is crucial to bouncing back from cyber-attacks quickly, fixing a human error, and managing change. accSenSe will provide strategic value for your IT.
    Diagnose and remediate posture changes within your IAM system.
    Get back to business as usual within hours and ensure business loss is kept to a minimum.
    Low RPO and high granularity, Keeping data retention to a maximum.
    Handle change and growth safely and securely, avoid misconfiguration.

  • Arctic Wolf Networks
    Booth:

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Avertium
    Booth:

    Avertium was born from 4 award-winning cybersecurity firms in 2019. Today, helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

  • Binary Defense
    Booth:

    Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.

  • BlackBerry
    Booth:

    BlackBerry provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including more than 175M cars on the road today. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security management, encryption, and embedded systems. BlackBerry’s vision is clear—to secure a connected future you can trust.

    BlackBerry. Intelligent Security. Everywhere.

    For more information, visit BlackBerry.com and follow @BlackBerry.

  • BlackCloak, Inc
    Booth:

    BlackCloak provides digital protection for corporate executives, Board Members, and high-profile and high-net-worth individuals and their families. Its award-winning Concierge Cybersecurity & Privacy™ Platform combines proprietary software with white-glove client service to prevent cyberattacks originating in an enterprise leader’s personal life from moving laterally into the organization. The Platform also protects individuals and their families from financial fraud, identity theft, targeted cyberattacks, reputational damage and other threats to privacy and security. Thousands of CISOs, CIOs, CFOs, and General Counsels trust BlackCloak to protect the personal privacy, devices, and homes of their most important personnel so they can continue to focus exclusively on what they do best: protecting the enterprise from cyberattack.

  • CardinalOps
    Booth:

    CardinalOps delivers AI-powered detection content and metrics to ensure your SOC is protected from the MITRE ATT&CK techniques most relevant to your organization’s adversaries, infrastructure, and business priorities.

    Leveraging proprietary analytics and API-driven automation, the platform continuously delivers new use cases enabling your SOC team to stay ahead of constant change in the attack surface and threat landscape – plus continuously identify and remediate broken rules and misconfigured log sources – so you can close the riskiest detection gaps that leave your organization exposed.

    Founded in early 2020, CardinalOps is led by serial entrepreneurs whose previous companies were acquired by Palo Alto Networks, HP, Microsoft Security, IBM Security, and others. The company’s advisory board includes Dr. Anton Chuvakin, recognized SIEM expert and Head of Security Solution Strategy at Google (formerly Gartner Research VP); Dan Burns, former Optiv CEO and founder of Accuvant; and Randy Watkins, CTO of Critical Start.

  • Centripetal
    Booth:

    Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.

  • Code42
    Booth:

    Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

  • Cybercrime Support Network
    Booth: N/A

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Cybereason
    Booth:

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • Expel
    Booth:

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • Fastly
    Booth:

    Expectations for websites and apps are at an all-time high. If they aren’t fast, secure, and highly personalized, users take their business elsewhere. But today’s most innovative companies are thriving by meeting this challenge head on: they’re choosing Fastly and an investment in their developers.

    With Fastly’s powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in today’s markets. Together, we’re building the future of the web.

  • ForgeRock
    Booth:

    ForgeRock® (NYSE: FORG) is a global leader in digital identity that delivers modern and comprehensive identity and access management solutions for consumers, employees, and things to simply and safely access the connected world. Using ForgeRock, more than 1,300 global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data—consumable in any cloud or hybrid environment. The company is headquartered in San Francisco, California, with offices around the world.

    For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media.

  • Infoblox, Inc
    Booth:

    Infoblox delivers modern, cloud-first networking and security experiences that are simple, automated, scalable and reliable. The company is the market leader with over 12,000 customers worldwide, including over 70 percent of the Fortune 500. The company’s portfolio of SaaS, data center, and hybrid offerings for DHCP, DNS, IPAM and security solutions enable organizations to leverage the advantages of on-premises and cloud-first architectures. The combination of NIOS, BloxOne DDI, BloxOne Threat Defense and threat intelligence services provide a robust foundation for connecting and securing the modern enterprise.

  • (ISC)2 Dallas-Fort Worth
    Booth:

    The Dallas-Fort Worth Chapter of (ISC)2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from (ISC)2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

  • Keysight
    Booth:

    Keysight works with innovators to push the boundaries of engineering to design, emulate, test, and deliver breakthrough electronics. Whether you’re looking to improve product experiences, optimize and secure your network, or get a head start on technologies like 5G, 6G, electric or autonomous vehicles, IoT, or quantum, Keysight accelerates innovation with intelligent insights built on the most accurate measurements to reduce risk and speed time-to-market. Forge ahead with confidence knowing your new technologies have been designed and tested for our increasingly connected and dynamic world.

  • Mimecast
    Booth:

    Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector—email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.

  • Netsurion
    Booth:

    Netsurion® delivers an adaptive managed security solution that integrates our XDR platform with your existing security investments and technology stack, easily scaling to fit your business needs. Netsurion’s managed offering includes our 24×7 SOC that operates as your trusted cybersecurity partner, working closely with your IT team to strengthen your cybersecurity posture. Our solution delivers managed threat protection so you can confidently focus on your core business.

    Headquartered in Ft. Lauderdale, FL, with a global team of security analysts and engineers, Netsurion is a leader in Managed Extended Detection & Response (MXDR). Learn more at www.netsurion.com.

  • Okta
    Booth:

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • Open Systems
    Booth:

    The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.

    We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.

    The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.

  • Qush Security
    Booth:

    Founded in 2016 to create a better, smarter way to deliver security. Innovative companies worldwide use Qush for human-centric data loss protection.

  • Recorded Future
    Booth:

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • RiskRecon
    Booth:

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • SecureLink
    Booth:

    SecureLink is a leader in managing secure third-party access and remote support for both enterprise companies and technology providers. SecureLink serves over 400 customers and 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming and retail rely on SecureLink’s secure, purpose-built platform.

  • SecurityMetrics
    Booth:

    Today, headquartered in Orem, Utah, we continue to provide expert services to small and large businesses around the world. We are most interested in helping businesses who view cybersecurity as a mindset rather than a checklist because we want to ensure the protection and success of our customers to the best of our ability.

  • Sonatype
    Booth:

    Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally

  • Thales
    Booth:

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • UpGuard
    Booth:

    UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

  • Women in CyberSecurity (WiCyS)
    Booth:

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Benjamin Brooks
    Founder & President, Praevalidis

    Benjamin D. Brooks is a cybersecurity professional United States Navy Veteran and Drilling Reservist, with over 20 years of information and cyber security experience across multiple industries, local, and the federated government. A CISSP and Ponemon Institute Distinguished Research Fellow, his work as founder of Preavalidis, LLC is based around leading client organizations' in the development and maturation of their cybersecurity programs, and special IT projects.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    William Smarr
    Special Agent in Charge, Dallas Field Office District, United States Secret Service
  • speaker photo
    Stefan Hare
    Network Intrusion Forensic Analyst (NIFA), United States Secret Service
  • speaker photo
    John B. Sapp Jr.
    VP, Information Security & CISO, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    Russell Dowdell
    Director, Sales Engineering, SecureLink

    For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations identify the SecureLink products and product features that can be leveraged to both improve security and streamline workflows.

  • speaker photo
    Kimberly KJ Haywood
    Vice President, (ISC)2 Dallas-Ft. Worth

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practit

  • speaker photo
    Amna Awan
    Director, Security Development & Engineering, Charles Schwab

    Amna Awan is Director, Security Development and Engineering, within the Technology Risk Management function of a major financial institution in the Dallas-Fort Worth area. She has an extensive technology background, including in development, and has held cybersecurity roles in the past with program ownership of multiple domains.

    Amna is a periodic speaker and panelist at industry events and is on the Advisory Council of SecureWorld Dallas. She is a co-author of the book, "The CISO Mentor: Pragmatic Advice for Emerging Risk Management Leaders." She has a business degree from the University of Texas at Austin, with specialization in Management Information Systems. She holds multiple certifications, including CISSP, CRISC, CCSP, and ITILv4.

  • speaker photo
    Tyler Fornes
    Principal Solutions Architect, Expel

    Tyler Fornes is a Principal Solutions Architect at Expel. Tyler formally led Expel's Global Response Team in performing incident response for both Expel's enterprise and cloud offerings. Prior to Expel, Tyler worked at FireEye after receiving a M.S. in Computing Security at the Rochester Institute of Technology.

  • speaker photo
    Muli Motola
    Co-Founder & CEO, accSenSe
  • speaker photo
    Austin Smith
    Director, Systems Engineering, Code42

    Austin has been in security focused sales roles for the past 15 years with over 30 years of combined experience between IT and Sales. In that time, he has been fortunate to work with organizations of all sizes to help them reduce their risk, whether those efforts were focused on external threats or internal risks to their organization.

    Early in his career, he ran a practice and was also fortunate enough to teach technology certifications to others during the evening. He has always seen himself as a coach/teacher, helping enable others to achieve their goals. Those goals may be those of the individual progressing through their career or the customer who is working to help mature their organization.

  • speaker photo
    Moderator: William Floyd
    CISO, FUTU US Inc.
  • speaker photo
    Jamison Utter
    Cyber Security Specialist, Infoblox

    Jamison brings 25+ years of IT/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer’s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike.

  • speaker photo
    Sonja Hammond
    VP & CISO, National Veterinary Associates

    Sonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with hands-on infrastructure knowledge and deep experience in large global corporate environments. She has had direct interaction with external regulators, worked in compliance and coordinated IT audit preparation and remediation. Sonja has done extensive information security work in vendor and supplier negotiations, mergers and acquisitions (MADO), risk and compliance, and provided lawsuit support as a forensic subject matter expert.

  • speaker photo
    Patrick Benoit
    VP, Global GRC & BISO, CBRE

    Patrick is the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. He has demonstrated repeated success guiding business strategy to achieve maximum positive business impacts with minimum resource expenditures. Talented at building and launching global technology and security programs, grooming high-performing teams across all domains, plus guiding the digital transformation, enhancing the digital customer experience, driving and enhancing revenue using technology and reducing risk to the business. A skilled executive leader, presenter, negotiator, and businessperson, able to forge solid relationships with strategic partners and build consensus across multiple organizational levels.

    He is certified as C/CISO, CISM, CISSP, CRISC, PMP, ITIL Expert, and Lean Six Sigma Black Belt. He is a pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and his favorite teaching is “From Chaos Comes Greatness,” a loose translation from the “I Ching."

  • speaker photo
    Paola Saibene
    Principal, Teknion Data Solutions

    Paola Saibene has been a technologist for 26 years, having held multiple C-suite roles (CIO, CTO, CSO) in large, global organizations, having received national awards in innovation and cybersecurity, and having led thousands of her own team members to fulfill business missions, and thrive despite constraints. She has also worked as a Data Privacy Officer and as a VP of Enterprise Risk Management. Paola blends innovation, digital transformation, strategy, growth, security, privacy, risk, compliance, and governance into an ecosystem of high resiliency and strength, especially as it pertains to data and its valuation process. Presently, Paola leads the Data Governance Practice at Teknion Data Solutions and teaches at Georgetown University (Information Security Master’s Program), Dallas Baptist University (Digital Risk Management Program), and the ENAE University in Spain (Master’s in Data Science ). Her curriculum across universities is built on data seen from a “Governance by Design” approach, infused with Cybersecurity, Data Privacy, Digital Ethics, Enterprise Risk Management, and Information Security Law. She is also the co-author of the “CISO Mentor”.

  • speaker photo
    Elvis Moreland, CISSP, ISSEP, CGEIT, CISM
    CISO & Computerworld Premier 100 Leader

    Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency (NSA), the ISC2 Certified Information Systems Security Professional (CISSP), and the Information Systems Security Engineering Professional (ISSEP). Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements.

    Elvis has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.

  • speaker photo
    Moderator: David Belanger
    CSO, Bestow

    Dave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also the Data Center Manager for a large telecom company, providing Operational and Physical Security for nearly a decade. He holds security industry certifications including CISSP, CCISO and CEH. Dave is on the Board of Directors for the North Texas chapter of ISSA. He is on several advisory boards and is actively engaged in the cybersecurity community as a volunteer, mentor, and speaker.

  • speaker photo
    John B. Sapp Jr.
    VP, Information Security & CISO, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    Michael Smith
    Sr. Information Systems Auditor, Parkland Health & Hospital System

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    Industry Certifications, Licensure, & Training
    Certified Information Security Specialist (CISSP)
    Certified Internal Auditor (CIA)
    Project Management Professional (PMP)
    Certified Fraud Examiner (CFE)
    Certified Information Systems Auditor (CISA)
    Information Library Information Technology (ITIL)

  • speaker photo
    Robert Scott
    Managing Partner, Scott & Scott, LLP

    Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.

  • speaker photo
    Eve Maler
    CTO, ForgeRock

    Eve Maler is ForgeRock's CTO. She is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and has also served as a Forrester Research security and risk analyst. She leads the ForgeRock Labs team investigating and prototyping innovative approaches to solving customers' identity challenges, along with driving ForgeRock's industry standards leadership.

  • speaker photo
    David Ellis
    VP, Forensic Investigations, SecurityMetrics
  • speaker photo
    Larci Robertson
    Solutions Engineer, Cybereason

    Larci Robertson is a Sales Engineer in the TOLA region at Cybereason. She began her cyber career in the United States Navy as a Signals Intelligence Analyst. She had many different opportunities in the intelligence community at sea and shore. She is a proud plank owner of the Navy Cyber Defense Operations Command (NCDOC) where she was one of the first Cyber Threat Intelligence (CTI) analysts as we know them today. After leaving the Navy she worked as a defense contractor for GDIT, Booz Allen Hamilton, and Raytheon in various roles in the intelligence and technology fields. She eventually found her way back to Cyber Threat Intelligence roles in the corporate world working for PepsiCo, Epsilon/Publicis and then finally providing security services in project management at McKesson before becoming a Sales Engineer at Cybereason. She also is the Board President of Women of Security and Dallas Chapter leader.

  • speaker photo
    Patterson Cake
    DFIR Principal Consultant, Avertium

    Patterson has worked in information-technology for more than two decades, focusing on information-security for the past several years, specializing in the development of incident-response teams, programs and processes. Before joining Avertium, he was a Senior Security Consultant for Haven Information Security, a Senior Security Engineer for AWS Managed Services, and has extensive experience in information-security across multiple verticals, from non-profit healthcare to cloud-service providers to financial-service providers. He also teaches for SANS, is a member of the GIAC GPEN advisory board, and is actively involved in the information-security community.

  • speaker photo
    Moderator: Brittany George
    Partner, IT Advisory, Weaver
  • speaker photo
    Michael Anderson
    CISO, Dallas Independent School District

    Michael Anderson is an accomplished corporate executive, entrepreneur, and business consultant. In January 2022, he was named BUiLT 2021 Speaker of the Year! With over 25 years of IT Management experience, he applies innovative methods to leverage his expertise for extraordinary outcomes. His specialties are risk management, cybersecurity, compliance, and infrastructure. Michael instructs security practitioners across the U.S. on how to align cybersecurity frameworks with the organization's strategic plan. He currently serves as CISO at Dallas ISD and Adjunct Professor at Collin College. Michael has a master's degree in Information Systems and Technology Management from Capella University with numerous certifications. When Michael isn't evangelizing, he enjoys spending time with his family, mindfulness coaching, and making music.

  • speaker photo
    Victor Mendoza
    Principal Solutions Architect, Thales

    Victor Mendoza, Principal Solutions Architect for Thales, is a member of the Cloud Protection and Licensing Solutions teams with 15+ years of experience in IT and cybersecurity. Today he works with companies in finance, healthcare, and oil & gas to streamline data security operations, accelerate growth and reduce risk to their most critical data or information from being disclosed, alter or denied access to. Previously, he work for a managed web hosting company before delivering strategic consulting services and leading an encryption services team for an organization with global presence.

  • speaker photo
    Dan Adcock
    Chief Operating Officer, Binary Defense

    As Binary Defense Chief Operating Officer, Dan Adcock leads all client service delivery organizations, ensuring the company evolves and maintains industry-leading cybersecurity capabilities to defend clients. He is responsible for top and bottom-line performance of the company while ensuring that clients’ business objectives in partnering with Binary Defense are achieved.

    Prior to Binary Defense, Dan was the Chief of Staff and Strategy Lead for the CEO of the Americas at Capgemini, a Global IT services firm, during a period when the company capitalized on economic recovery conditions to grow at more than double the IT services market in the Americas. He also served as the Vice President and Chief Operating Officer of the Capgemini Americas Cybersecurity Practice from 2019 – 2021, overseeing a period of significant growth in revenue and profitability.

    He has 20 years of experience in corporate strategy, business development and client service delivery that began at Lockheed Martin, led to the formation of Lockheed Martin Commercial Cyber in 2014 and then the leadership of that organization through hyper growth and a series of mergers and acquisitions to become Leidos Cyber, which was acquired by Capgemini in 2019. As a leader in the cyber industry since 2014, he has led global teams that have delivered cybersecurity consulting and operational transformation for leading global enterprises and over one-quarter of the Fortune 500.

    A graduate of Texas A&M with a Bachelor of Science in Industrial Engineering and Georgetown University with an MBA, Dan lives in North Texas with his wife and four children. When not watching his kids’ sporting activities, he enjoys playing soccer, golf, and traveling.

  • speaker photo
    Will Woodsen
    Staff Security Engineer, Fastly

    Will has spent the past decade in various cybersecurity roles, most recently at Fastly building web security and anti-fraud products. Prior to Fastly, he worked to develop security operations teams and capabilities for government, financial services, and security product companies. When not working you can find Will spending time with the answer to all his security questions, a tuxedo cat named Pippin.

  • speaker photo
    Panel Discussion
  • speaker photo
    Shawn E. Tuma
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Steven H. Anderson
    Director, Cyber Underwriting, Safety National
  • speaker photo
    Sean Scranton
    Consultant, Cyber Risk Solutions Team, WTW

    Cyber Liability National Practice Leader (current).
    IT Security / IT Auditor at RLI for 8 years.
    Network / security consulting / auditor for financial institutions, government for 9 years.
    Network / firewall administrator in healthcare for 7 years.

    Designations - CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
INVEST IN YOUR GROWTH!

Join us for high-quality, affordable cybersecurity training and networking. Sign up today!