- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, October 2, 20249:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO & Managing Director, Cyber Risk Opportunities LLCRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: HillhavenHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, October 3, 20247:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)The Vital Importance of Cyber Risk Governance and Business ContinuityAssociate Director, Network Security, VerizonRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amLocation / Room: Spring GladeJoin your CISO peers for an engaging roundtable discussion on the critical intersection of cyber risk governance and business continuity planning. This interactive session for Advisory Council members and select VIPs provides a forum for security leaders to share experiences, challenges, and best practices in aligning cybersecurity strategies with organizational resilience. Key discussion points may include:
- Integrating cybersecurity considerations into enterprise-wide business continuity plans
- Strategies for effective communication of cyber risks to boards and executive leadership
- Lessons learned from recent high-profile cyber incidents and their impact on business continuity
- Emerging technologies and their role in enhancing cyber resilience and business continuity
8:00 amThe Rise of Bossware: A Privacy ParadoxSr. Information Systems Auditor, Parkland HealthRegistration Level:- Conference Pass
8:00 am - 8:45 amLocation / Room: Sunny SlopeThe rise of “bossware” has surged due to remote work. Employers seek insights into productivity, security, and compliance. These concerns resulted in a privacy paradox: bossware provides valuable data but raises crucial privacy concerns that center around balancing surveillance with employee rights. Bossware features include keystroke logging, screen recording, and webcam activation increase the risk of trust erosion, legal implications, and employee morale. Transparency and informed consent are essential elements of navigating the Legal Landscape with data protection laws (GDPR, CCPA, etc.).
This presentation provides ideas on best practices for achieving transparent communication by educating employees about monitoring, achieving privacy by design by implementing privacy-friendly bossware, and the importance of regular audits to assess the impact and effectiveness of the bossware implementation. Security professionals must address the bossware dilemma strategically. This session helps find the sweet spot where smart security meets employee trust, ensuring a productive and respectful work environment.
8:00 amCyversity North Texas Chapter Meeting: A Meet and GreetOpen to all attendeesVice President/Chapter Leader, CyversityVice President/Chapter Leader, CyversityPresident, Cyversity North Texas ChapterRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: FairviewCome meet the leadership and other members of the Cyversity North Texas Chapter and learn about the mission to achieve the consistent representation of women, underrepresented communities, and all veterans in the cybersecurity industry through programs designed to diversify, educate, and empower.
8:00 amBlackGirlsHack Meeting [Open to all attendees]Offensive AI: The Future of Red TeamingFounder & Executive Director, BlackGirlsHackRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: Northbrook I, II, IIIIn today’s evolving threat landscape security professionals must stay ahead by adopting innovative tools and methodologies. This talk, given by the founder of the international cybersecurity nonprofit BlackGirlsHack, delves into the intersection of Python, artificial intelligence, and network security by demonstrating a customized security tool for exploring reconnaissance and resource development vulnerabilities within the MITRE ATT&CK framework.
During the session, we will examine how the tool leverages Python and ChatGPT’s capabilities to streamline reconnaissance and resource development tactics, enhancing the effectiveness of penetration testing exercises. The talk will provide insights into integrating artificial intelligence, particularly ChatGPT, to augment the tool’s capabilities, enabling testers to focus their efforts more efficiently.
Attendees will witness a live demonstration showcasing the practical application of HackingBudy in conducting external network penetration tests, leveraging the MITRE ATT&CK framework. We will also discuss scenarios where artificial intelligence can be leveraged to optimize testing strategies, ultimately bolstering cybersecurity defenses.
By the end of the talk, participants will understand how artificial intelligence can be harnessed to enhance penetration testing efforts, thereby fortifying their organizations against emerging cyber threats.
8:00 amInfraGard North Texas Members Alliance: New Member OrientationOpen to all attendeesSpecial Agent, FBIAVP, InfraGard North Texas Members AllianceRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: Keynote TheaterThe InfraGard North Texas Members Alliance welcomes SecureWorld’s attendees in joining us for our new membership orientation. You will learn about the history of InfraGard, what InfraGard is, how InfraGard can benefit you and the North Texas community, and much more. Our goal for this presentation is to ensure that everyone feels well-informed and empowered to make the most out of their membership. And don’t miss our special guest, Special Agent Kevin Minor of the FBI!
We encourage everyone to ask questions, engage actively during the meeting, and learn about the InfraGard resources that will now be available with your new membership access. This meeting is open to anyone interested in learning more about InfraGard North Texas and possibly joining.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The Hidden Costs of Cybersecurity: Unveiling the True Price of ProtectionCISO, City of ArlingtonDeputy CISO, Toyota Financial Savings BankCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterWith cyber threats evolving at an unprecedented pace, organizations are increasingly aware of the need for robust cybersecurity measures. However, the true cost of cybersecurity extends far beyond the visible expenses of software licenses and security personnel. This keynote panel delves into the often-overlooked aspects of cybersecurity that can significantly impact an organization’s bottom line and operational efficiency. The panel explores:
- The multifaceted nature of cybersecurity costs, beginning with the critical yet often underestimated areas of incident response (IR) readiness and preparedness.
- The importance of comprehensive business continuity planning, highlighting how inadequate planning can lead to substantial financial losses and reputational damage. The panel cites real-world examples, including the recent CrowdStrike outage, to illustrate the cascading effects of service disruptions on both providers and their clients.
- The legal aspects of cybersecurity, exploring how regulatory compliance, potential liabilities, and the cost of legal counsel in the aftermath of a breach contribute to the hidden costs of security. Don’t forget the often-underestimated impact of third-party risk and the importance of robust vendor management practices.
- How to challenge the conventional wisdom of relying heavily on a single security vendor, advocating for a diversified approach that can enhance resilience and reduce dependency risks. The panel also addresses the counterintuitive problem of implementing too many security controls, which can paradoxically slow recovery efforts after an incident and increase operational complexity.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amThe Dark Side of AI: Using AI to Enable AttacksSr. Security Researcher, NokiaRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: FairviewDue to the rise of generative AI, AI has become more accessible to the public. Therefore, more and more people are using AI to perform various tasks. Unfortunately, although AI can be used for many good things such as powerful data analytics, criminals are using AI to help them perform various attacks from generating more convincing phishing emails to stealing passwords. In this presentation, learn about the different techniques that criminals are using to attack systems with the help of AI, and discuss what organizations and individuals can do to prepare and protect themselves from this threat.
10:15 amHow TIAA Is Addressing the Cybersecurity Skill Shortage InternallySr. Lead Information Security Business Manager, TIAARegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: Sunny SlopeThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
10:15 amBuilding a Strong Defense with PCI CompliancePartner, IT Advisory, WeaverPartner, Cybersecurity Services, WeaverRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: Northbrook I, II, IIIAs the cybersecurity landscape evolves, the associated PCI requirements supporting those security considerations are also changing. Is your organization well positioned to adapt to the updated guidance issued with version 4.0.1 and the upcoming implementation deadlines for the March 31, 2025, requirements? This presentation explores the essential quick wins for payment card security and PCI compliance related to the new version, 4.0.1, and how to best guard your cardholder data without committing the whole IT team defensive line to compliance-related tasks.
Key topics include:
- Rule Changes: Updates to PCI DSS in version 4.0.1
- Game Footage: Common High-Risk Misses
- Away Games: Future Dated (2025) Requirements
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amInstrumenting Your Security ProgramCISO, Health Care Service CorporationRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: FairviewWith the foundation of how the aviation industry has achieved very high safety records, you will learn a new perspective on how to instrument your information security program to reduce risk. This is NOT a presentation about what metrics you should measure, but a framework for identifying meaningful metrics and, more importantly, how to use them to ensure effective attack surface management at scale, moving past compliance and into operational excellence.
11:10 amThe New Privacy Landscape in Texas and BeyondData Privacy & Cyber Partner, Spencer Fane LLPRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: Sunny Slope“Everything is bigger in Texas,” and that now includes privacy protections. Texas has rolled out its version of a comprehensive privacy law that aims to reshape data privacy and security in the Lone Star State. This discussion unpacks key changes and compliance tips ushered in by this legislation, detailing implications for businesses and individuals. Learn about key consumer rights, data handling obligations, and compliance strategies to avoid violations.
11:10 am[Panel] Unveiling the Threat Landscape and Unmasking Digital VillainsSolutions Architect, Aqua SecurityDigital Security Consultant, Americas DPS, EntrustMySQL Master Solutions Engineer, OracleFormer CIO/CISO, FUTU US Inc.Registration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: Northbrook I, II, IIIIn the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.
Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.
Our panel provides a comprehensive overview of the current threat landscape.
12:00 pm[Lunch Keynote] One Thing Leads to Another: Lessons in Enterprise Cyber Resilience from DoD Aviation Cybersecurity and a Popular Song from the '80sCyber Fellow, Aeronautics Cyber Range, Lockheed MartinRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe quintessential ’80s music track “One Thing Leads to Another” by The Fixx doesn’t just blend a catchy melody, sharp lyrics, and an energetic and distinctive sound; it also foreshadowed emerging concepts of cyber resilience. This session examines enterprise IT cybersecurity through the unique lens of DoD aviation platforms as informed by this iconic song.
Military aircraft that operate in cyber-contested environments face cyber threats from highly capable nation-state adversaries. That experience has yielded battle-tested insights and strategies that are directly applicable for those who defend traditional commercial networks. Today’s nation-state exploits become tomorrow’s script-kiddie tools, so you don’t want to miss this rare opportunity to gaze into the future.
12:00 pmAdvisory Council Lunch Roundtable (VIP / Invite Only)How to Secure Your Organization from Internal and External Identity-Based ThreatsVice President, GuruculRegistration Level:- VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: Spring GladeDo you know if a threat is an Insider Risk or a Compromised Identity? Securing your organization from identity-based threats is paramount to reducing cyber risk. Security operations teams need the tools to help them quickly determine if they are dealing with a true insider threat or a compromised account. It’s important to link identity, access and activity to achieve clarity about gaps and risks that insider or external threat actors can exploit. In this closed-door, peer-to-peer discussion, we will discuss ways to combat these threats, reduce the attack surface, manage risk, and protect your enterprise.
Advisory Council roundtable discussion moderated by:
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmIntegrate Transformative OT Cybersecurity Programs to Increase EffectivenessPrincipal, CI5O Advisory Services LLCRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: FairviewAt the operational field, plant, or edge level, growing risks like cybersecurity must be managed amid a need to democratize and expand technology within an increasingly connected workplace. Traditional approaches of handling cyber, analytics, edge, and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results. Operational management frameworks are designed to provide consistency and reliability at the field level for various reasons, including safety and environmental priorities, and can create friction with innovative techniques and large-scale change. Culture clashes between OT, IT, and Operations teams and priorities worsen this situation.
It’s important to appreciate how transformative OT cybersecurity programs are in order to integrate those objectives and ways of working into existing frameworks. This also allows cybersecurity teams to take advantage of new models and emerging technology which can accelerate progress. Finding and supporting these solutions is not enough though; companies need to apply a different approach to leading their internal change to overcome resistance and improve engagement.
1:15 pmNavigating the Cybersecurity Maze in M&A: A CISO's Perspective on Integration ChallengesSVP & CISO, Sunflower Bank, N.A.Registration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: Sunny SlopeThis session explores the critical cybersecurity challenges faced by CISOs during mergers and acquisitions from the acquiring company’s viewpoint. Just days after Legal Day 1 of a merger, Parrish will delve into the complexities of integrating disparate security cultures, technologies, and practices while maintaining a robust security posture throughout the M&A process. Key topics include assessing the target company’s security landscape, managing risk during transition, and strategies for harmonizing security policies and controls. Special attention will be given to the intricate task of consolidating third-party vendor relationships and associated risks. Gain practical insights on fostering a unified security culture, streamlining technologies, and ensuring compliance across the newly formed entity.
1:15 pm[Panel] Elevating Security Through Threat Intelligence, Cloud Resilience, and AI InnovationsSecurity Architect, VaronisCEO, Envision Technology AdvisorsDirector, KMicro TechPartner, IT Advisory, WeaverRegistration Level:- Open Sessions
1:15 pm - 2:00 pmLocation / Room: Northbrook I, II, IIIStaying ahead requires a proactive and multifaceted approach in an era of increasingly sophisticated cyberattacks. This expert panel will explore how organizations can elevate their cybersecurity posture by leveraging advanced threat intelligence, building cloud resilience, and integrating AI-driven innovations.
Discover how threat intelligence is evolving to offer more predictive and actionable insights, how cloud resilience strategies are vital for safeguarding critical infrastructure, and how cutting-edge AI tools can automate detection, response, and even decision-making in the fight against emerging threats.
Join us for an in-depth discussion on how these critical components work together to form a stronger, smarter, and more adaptive security ecosystem.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceSVP, South Central Zone Regional Manager, Cyber Practice, MarshCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: Sunny SlopeIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
2:10 pmIntegrating Threat Intelligence with Penetration Testing: A Simulation-Driven Approach to Cyber ResilienceSr. Threat Intel Analyst, Fortune 500 Convenience RetailRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: Northbrook I, II, IIIThis presentation explores the integration of attack simulation tools with real-time threat intelligence to mimic sophisticated cyberattacks accurately. It highlights adaptive threat modeling, automation in penetration testing, and the role of machine learning in predicting and automating testing processes. The discussion emphasizes the enhancements in security postures, incident response, and resource allocation, alongside addressing challenges like scaling simulations and reducing false positives. It concludes with future trends in leveraging AI for advancing penetration testing and threat intelligence, offering a blend of technical depth and strategic insights for an audience keen on both practical and theoretical aspects of cybersecurity.2:10 pmLoaves and Phishes: Establishing Purpose in the Nebulous and Evolving Terrain of CybersecurityCommissioner, City of Austin's Community Technology and Telecommunications CommissionRegistration Level:- Open Sessions
2:10 pm - 2:55 pmLocation / Room: FairviewAfter spending time in the Army, Gabriel began to transition into the cybersecurity sector, safeguarding digital infrastructures against evolving threats. He felt a calling to serve his country in a more direct and tangible manner. The decision to transition was not easy, as it required leaving behind a guaranteed path for the unknown challenges of civilian life. However, he was driven by a desire to apply his expertise in a different context, one where the stakes were even higher, and the impact more immediate.
During this journey, he encountered various challenges, from adapting to the rigorous physical training regimen to learning the intricacies of security protocol. Yet, through perseverance and a willingness to learn, he was able to overcome these obstacles and find his footing in this new environment. This experience taught him the importance of adaptability and resilience, qualities that are as crucial in the military as they are in the ever-changing landscape of cybersecurity.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourSponsored by Envision Technology AdvisorsRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.
Generously sponsored by:
3:30 pm[Closing Keynote] Cyber World on Fire: Global Digital War's Impact on Governments, SocietiesCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterIn this eye-opening keynote loaded with an insider’s perspective on the latest developments in the Global Cyber War, hear how the Ukraine-Russia and Israel-Hamas wars and continual attacks from nation-states on entities across the globe are impacting governments and societies around the world. Weaving together the latest cyber intelligence with current military, diplomatic, government, and corporate developments, Col. Leighton assesses current efforts to counter bad actors and charts a path forward as the good guys and gals rush headlong into a cyber world heavily influenced by the dawn of AI and other game-changing technologies.
- Aqua SecurityBooth: 320
Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.
- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- Cato NetworksBooth: 360
Cato Networks pioneered the convergence of networking and security into the cloud. Aligned with Gartner’s Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks, Cato’s vision is to deliver a next generation secure network architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Our cloud-native architecture enables Cato to rapidly deploy new capabilities and maintain optimum security posture, without any effort from the IT teams. With Cato, your IT organization and your business are ready for whatever comes next. For more information, visit https://www.catonetworks.com.
- Cyversity North TexasBooth: TBD
Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.
- Data TheoremBooth: 120
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. Data Theorem is headquartered in Palo Alto, Calif., with offices in New York, Paris, France, and Bangalore, India.
- EndaceBooth: 310
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- EntrustBooth: 100
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.
- Envision Technology AdvisorsBooth: 270
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- GuruculBooth: 340
Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Cloud-native Next-Gen Security Analytics and Operations Platform provides customers with Next Generation SIEM, UEBA, Open XDR, and Identity & Access Analytics. It leverages machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent data breaches, fraud and insider threats. It also reduces the attack surface for accounts and eliminates unnecessary access rights and privileges to increase data protection.
Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cybersecurity. The company was founded in 2010 by seasoned entrepreneurs with a proven track record of introducing industry-changing enterprise security solutions. Gurucul’s mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.
Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise. It is also used for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. Gurucul is headquartered in Los Angeles, CA.
- HuntersBooth: 330Hunters SOC Platform transforms security ops with AI and automation, providing a superior alternative to traditional SIEM systems. It streamlines threat detection and auto-investigation, empowering analysts with deeper insights and efficiency.
- IllumioBooth: 110
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. - KeysightBooth: 210
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- KMicro Tech, Inc.Booth: 250
KMicro Tech Inc. provides a suite of scalable IT managed services combining streamlined cloud and on premise solutions that are specific to the needs of our enterprise customers. We enable our clients to focus on their business and not IT. We do that by working closely with our clients to understand their business and help them navigate through information technology so their companies are positioned to thrive in today’s competitive marketplace.
- InfraGard North Texas Members AllianceBooth: TBD
The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:
- Local quarterly membership meetings focused on infrastructure protection
- Sector-specific meetings and information exchanges (see Sector Chief Program).
- Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
- Networking opportunities with peers within and across all sectors
- ISC2 Dallas-Fort Worth ChapterBooth: TBD
The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.
- Association of Continuity Professionals (ACP) North TexasBooth: TBD
ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.
Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week. We invite you to attend our next meeting.
- North Texas ISSABooth: TBD
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.
- OktaBooth: 280
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- MySQLBooth: 200
MySQL Enterprise Edition includes the most comprehensive set of advanced features, management tools and technical support to achieve the highest levels of MySQL scalability, security, reliability, and uptime. It reduces the risk, cost, and complexity in developing, deploying, and managing business-critical MySQL applications.
- Pure Storage, Inc.Booth: 300
Pure Storage is pioneering a new class of enterprise storage that has been designed from the ground up to take full advantage of flash memory. The company’s products accelerate random I/O-intensive applications like server virtualization, desktop virtualization (VDI), database (OLTP, rich analytics/OLAP, SQL, NoSQL), and cloudcomputing.
Pure Storage makes it cost-effective to broadly deploy flash within the data center, enabling organizations to manage growth within existing power and space constraints. Launching later this year, the company’s products are in private beta with select customers. Pure Storage is funded by Greylock Partners and Sutter Hill Ventures.
- ThreatLockerBooth: 220
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- VaronisBooth: 260
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
- WiCyS Dallas Forth Worth AffiliateBooth: TBD
- ZeroFoxBooth: 350
Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.
Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.
- Glen Sorensen, InstructorvCISO & Managing Director, Cyber Risk Opportunities LLC
Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.
- Tianne Strombeck, ModeratorAssociate Director, Network Security, Verizon
Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has worked with the network teams to imbed security requirements into their new development and operating processes.
- Michael R. SmithSr. Information Systems Auditor, Parkland Health
Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.
Industry Certifications, Licensure, & Training
Certified Information Security Specialist (CISSP)
Certified Internal Auditor (CIA)
Project Management Professional (PMP)
Certified Fraud Examiner (CFE)
Certified Information Systems Auditor (CISA)
Information Library Information Technology (ITIL) - Robert CowansVice President/Chapter Leader, Cyversity
Robert Cowans is a seasoned professional with a diverse background and a proven track record of success in various industries. Throughout his career in the United States Army, Dep. Of Homeland Security, and American Airlines. He has held numerous positions in leading organizations, where he has consistently demonstrated his ability to drive growth and deliver results.
In addition to his professional accomplishments, Robert is known for his commitment to giving back to the community. Throughout his career, he has actively supported organizations such as Protect.org: Human Exploitation Rescue Operative (H.E.R.O. Corps) and a Cyversity as an Ambassador, leveraging his skills and expertise to make a positive impact.
Robert holds a bachelor’s degree in Computer Forensics and Digital Investigations from Champlain College and has continued to invest in his professional development through various certifications and industry-related courses. He stays abreast of the latest trends and best practices, ensuring that he remains at the forefront of his field.
- Saleem KhanVice President/Chapter Leader, Cyversity
Saleem Khan is a seasoned IT security leader with over 20 years of experience in enhancing organizational cybersecurity and aligning it with business objectives. His impressive career spans roles at ServiceNow, Emory University, AT&T, and The Coca-Cola Company, where he excelled in IT risk management and GRC processes. Known for his strategic vision and empathetic leadership, Saleem is a trusted advisor to executives and stakeholders.
He holds an Executive MBA from Georgia Tech, a BS in Computer Engineering from LSU, and certifications including CISA and Scrum Master. Saleem's expertise in bridging technical complexities with business strategy continues to drive innovation in cybersecurity.
- Renaldo McKenzie, HostPresident, Cyversity North Texas Chapter
Renaldo McKenzie is a seasoned professional & cybersecurity leader with a diverse background of proven success in various industries and critical sectors such as Information Technology, Healthcare, Communications, Financial, Transportation, and Government.
His knowledge and expertise are in program development, management, and advancement of Governance, Risk, and Compliance, Identity & Access Management, Security Operations, and Security Awareness Education & Training where he has successfully developed, managed, and transformed several organizational security programs through collaborative stakeholder engagement to drive change, align with business objectives, and scalability.
Renaldo conducted his studies at Navarro College and The University of Texas at Arlington and has continued his professional development & education through various courses, certifications, and hands on engagements.
In addition to his professional experience, Renaldo is known for often giving back to the community by serving as an advisor, mentor, and ambassador for several individuals and organizations. - Tennisha MartinFounder & Executive Director, BlackGirlsHack
Tennisha Martin is the Founder and Executive Director of BlackGirlsHack (BGH Foundation), a national cybersecurity nonprofit organization dedicated to providing education and resources to underserved communities and increasing the diversity in cyber. She has worked in a consulting capacity for more than 15 years and in her spare time is a CEO, best-selling author, award-winning hacker, mentor, penetration tester, and advocate for diversity.
- Kevin Minor, Guest SpeakerSpecial Agent, FBI
- Bryce CarterCISO, City of Arlington
Bryce Carter is a nationally-recognized leader known for his transformative impact on organizational culture and his ability drive cybersecurity as a key business enabler. Bryce has not only developed groundbreaking security strategies that safeguard data, but has also focused on the broader welfare of communities. His visionary approach has earned him positions on multiple advisory boards, where he helps shapes next-generation policies and technologies. In addition, Bryce contributes to the growth of future leaders by mentoring upcoming executives and technology professionals. His achievements have helped lay the groundwork for a more innovative, resilient, and inclusive future.
- Brandi JohnsonDeputy CISO, Toyota Financial Savings Bank
Dynamic, strategic, results-driven Cybersecurity executive with deep proven experience in ensuring the security of business systems. Uses thoughtful analysis to reduce enterprise risk, cyber risk, and operational risk by deploying focused proven solutions. Leader in Cybersecurity, emerging technologies, data platforms and Governance Risk and Compliance operations. Experienced in implementing security tools, cloud technology, data and building regulatory governance programs like GDPR and CCPA. Currently pursuing CISM certification.
- Shawn E. Tuma, ModeratorCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Anmol AgarwalSr. Security Researcher, Nokia
Anmol Agarwal is a security researcher at a Fortune 500 Company and is focused on securing AI and Machine Learning in 5G and 6G. She holds a doctoral degree in cybersecurity analytics from George Washington University and a master’s degree in computer science from the University of Texas at Dallas. She previously worked at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in the High Value Asset Program Management Office. In her free time, she enjoys giving back to the community and is an active industry mentor.
- Kathryn PattersonSr. Lead Information Security Business Manager, TIAA
Kathryn Patterson supports the Global Cybersecurity & Fraud Management organization at TIAA. In prior roles, she managed 3rd Pty Assessment, Regulatory Exam Mgmt and Audit support, and RCSA. Her career spans three industries: healthcare, telecommunications, and financial services, with additional background in program management, business resiliency and internal investigations. She prioritizes collaboration with business partners on best practices, communications, training, and development. Kathryn holds a BA in Organizational Leadership from the University of Oklahoma with a concentration in Criminal Investigations and Intelligence Analysis.
- Brittany GeorgePartner, IT Advisory, Weaver
Brittany George, CISA, CISM, PCIP, QSA, has over two decades of experience, including former Big Four experience with a focus on public company audits. Her current focus includes cybersecurity, system and organization controls (SOC) reporting, evaluation and testing of IT general controls (ITGCs) and regulatory compliance (including Payment Card Industry and Sarbanes-Oxley). She is also deeply experienced with system integration and user acceptance testing. Having spent the beginning of her career with TXU/Capgemini Energy, she has a deep understanding of utilities and the energy industry. She also has extensive government experience, having led IT audit activities for numerous municipalities and school districts. Additional industry experience includes technology service providers, financial services, oil and gas, health care and banking.
Brittany is a member of the IIA, AFCOM and Tech Titans, for which she serves on the Cybersecurity Forum. She is also a member and past president of the North Texas chapter of ISACA. Highly respected in her field, she has been a guest lecturer at the University of Texas at Austin and University of Oklahoma and often presents on security and other IT advisory topics, including having presented at the PCI North America Community Meetings, Infosec World, various ISACA chapter meetings, the IIA, Allinial Global, SecureWorld and TXCPA meetings.
A Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Payment Card Industry Professional (PCIP) and a PCI Qualified Security Assessor (QSA), she earned a Bachelor of Business Administration in management information systems from the University of Oklahoma and a professional graduate certificate in cybersecurity from Harvard.
- Trip HillmanPartner, Cybersecurity Services, Weaver
- Ian SchnellerCISO, Health Care Service Corporation
A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this role he led high impact global teams and advised the US Congress and Executive Branch, resulting in a coordinated, funded national approach to resolve the highest cyber concerns of Government leadership. In the financial sector, Ian has led strategic capabilities to protect critical infrastructure from cyber-attack.
- Jeremy RuckerData Privacy & Cyber Partner, Spencer Fane LLP
Jeremy Rucker leads businesses through the evolving and complex landscape of data privacy, security, and incident response. As a data privacy and cybersecurity attorney, Jeremy regularly counsels clients in all industries on the emerging federal, state, and international data laws and regulations, and also serves as a breach coach to guide organizations through national data breach notification processes and resultant regulator investigations.
Jeremy is a frequent speaker on data privacy and cybersecurity matters and is certified by the International Association of Privacy Professionals as a Privacy Law Specialist. Additionally, Jeremy holds double certifications as a Certified Information Privacy Professional for United States law (CIPP/US) and European law (CIPP/E); and a certification as a Certified Information Privacy Manager (CIPM – IAPP).
- Ahmer MirzaSolutions Architect, Aqua Security
Ahmer Mirza is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past three years. With a robust background in computer engineering technology, his role at Aqua Security involves implementing cutting-edge security solutions and leveraging his expertise to address complex challenges in the ever-evolving field of cloud native security. Ahmer’s blend of technical acumen and innovative problem-solving makes him an asset to his team and a trusted advisor to clients seeking to safeguard their cloud environments.
- Ed ReynoldsDigital Security Consultant, Americas DPS, Entrust
Ed has over 20 years’ experience in cybersecurity, covering SSL/VPN, Intel chip security technologies, endpoint protection, DLP, data at rest/in motion encryption technologies, key management, and managed security services. Based in Austin, Texas, Ed is a member of the Entrust Digital Security Solutions Center of Excellence for Data Protection Solutions. Prior to Entrust, Ed served in strategic alliance roles at Thales DIS and Symantec, where he worked with Global System Integrators. Earlier, he held leadership roles software products at Dell, semiconductors at Britestream Networks, and networking products at Compaq and Motorola.
- William Floyd, ModeratorFormer CIO/CISO, FUTU US Inc.
I am an innovative technology executive with extensive leadership experience within a diverse portfolio of technology-driven public and private companies. I am results driven with considerable experience leading teams, implementing complex software products, IT projects, and administering large capital budgets.
I am a dynamic leader and designer of innovative and high-performing teams that contribute strategically across organization initiatives. I am a strong communicator with focus on team success through a professional and meticulous approach to leading initiatives with uncompromising leadership, organizational development, and business operations skills.
I have a successful track record of commercial/SaaS product and technology delivery that produces business growth, garnering awards and industry-wide recognition. I am a flexible team leader willing to take risks, adopt new methods, and seek opportunities for improvement of systems and processes.
I have been a leader of a variety of software product management and product development teams of all sizes, through all phases of Internet, mobile and software product management, product development, quality assurance, program and release management and DevOps deployment. I have also included the leadership of Information Technology infrastructure and operations teams responsible for enterprise IT System operations, development, and enterprise deployment.
- Teresa MerklinCyber Fellow, Aeronautics Cyber Range, Lockheed Martin
Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.
- Chris Scheels, ModeratorVice President, Gurucul
Chris has been aligning people, processes and technology to drive companies forward for over 20 years. He has a decade of cybersecurity experience in product marketing and product management. His passion is helping businesses succeed through the strategic use of technology. Most recently he was helping customers accelerate their Zero Trust journey at Appgate, Inc. His background also includes experience in operations, sales, and new business development.
- Al LindsethPrincipal, CI5O Advisory Services LLC
Highly effective and successful senior executive with 25 years in the energy industry. Experience and knowledge spans different markets, products, business models and disciplines. Proven track record of:
Driving resolution of the top challenges facing different groups, companies or individuals, whether as a member of its management team or as an outside expert;
Acting as change agent to effect turnaround situations and solve critical problems;
Balancing between an entrepreneurial culture and the discipline to achieve the high standards and controls of a large public company; and
Doing more with less (PAALP ranked #5 in Forbes 500 in revenues/employee in 2009) - Parrish GunnelsSVP & CISO, Sunflower Bank, N.A.
Parrish is currently SVP & CISO of Sunflower Bank and has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information security. His experience also includes working in multiple industries including financial services, telecommunications, chemical manufacturing, real estate, and retail. In addition, he has worked in both global Fortune 500 companies and small start-up-based companies.
During his tenure as a CISO, he has been involved in the creation, staffing, building, and management of comprehensive information security programs for various companies across diverse locations and personnel. In all these companies, he has implemented programs based on risk and threat analysis and has implemented controls, services, and processes that have not only met the needs of the company but also the regulatory and compliance requirements of the company including incident response capabilities.
Parrish holds a Master of Business Administration from Texas Christian University and certifications as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), and Professional Project Manager (PMP).
- Brock BauerSecurity Architect, Varonis
Brock Bauer is a Security Architect from the Incident Response Team at Varonis. He helps customers achieve their security goals through the Varonis platform by enabling them to detect and respond to threats, reduce their attack surface, and mature their security programs. Brock has worn various hats during his career in Enterprise IT Administration, Software Security Architecture, and Incident Response.
- Todd KnappCEO, Envision Technology Advisors
Todd has been providing IT services nationally for over 25 years and draws inspiration and insight from participation in a wide range of executive boards and industry associations. He has an extensive background in strategic planning and implementation of business technology solutions, and founded his firm Envision Technology Advisors. As a presenter, Todd speaks throughout the country on a variety of technology and business topics including: Modern Workplace, Digital Transformation, Cybersecurity, and Evolving Digital Culture to fit the Modern Workforce.
In his free time, Todd works with several non-profits and is also an avid sailor, wood worker, and scuba diver.
- Dillon White, ModeratorDirector, KMicro Tech
Meet Dillon White, a Solutions Engineering whiz and the driving force behind sales engineering at KMicro Tech. With a knack for hybrid cloud solutions and services, Dillon combines his extensive industry experience with a dash of innovation to spark business growth. Before diving into the tech world, Dillon served eight impactful years in the United States Coast Guard, adding a unique perspective to his expertise.
From cybersecurity to Microsoft Dynamics 365, Azure, and Modern Work, Dillon has seen it all. He's your go-to guide for digital transformation, helping businesses—big and small, retail and federal—navigate the tech maze and come out on top. His strategic insights and customer-first approach have consistently empowered organizations to hit new heights. - Brittany George, ModeratorPartner, IT Advisory, Weaver
Brittany George, CISA, CISM, PCIP, QSA, has over two decades of experience, including former Big Four experience with a focus on public company audits. Her current focus includes cybersecurity, system and organization controls (SOC) reporting, evaluation and testing of IT general controls (ITGCs) and regulatory compliance (including Payment Card Industry and Sarbanes-Oxley). She is also deeply experienced with system integration and user acceptance testing. Having spent the beginning of her career with TXU/Capgemini Energy, she has a deep understanding of utilities and the energy industry. She also has extensive government experience, having led IT audit activities for numerous municipalities and school districts. Additional industry experience includes technology service providers, financial services, oil and gas, health care and banking.
Brittany is a member of the IIA, AFCOM and Tech Titans, for which she serves on the Cybersecurity Forum. She is also a member and past president of the North Texas chapter of ISACA. Highly respected in her field, she has been a guest lecturer at the University of Texas at Austin and University of Oklahoma and often presents on security and other IT advisory topics, including having presented at the PCI North America Community Meetings, Infosec World, various ISACA chapter meetings, the IIA, Allinial Global, SecureWorld and TXCPA meetings.
A Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Payment Card Industry Professional (PCIP) and a PCI Qualified Security Assessor (QSA), she earned a Bachelor of Business Administration in management information systems from the University of Oklahoma and a professional graduate certificate in cybersecurity from Harvard.
- Shelly ThomasSVP, South Central Zone Regional Manager, Cyber Practice, Marsh
Shelly is the Southcentral Zone Regional Manager within Marsh’s Cyber Practice in Dallas, TX. Responsibilities include advising a number of Marsh’s clients across various industries on risk transfer solutions and helping clients tactically navigate the evolving cyber and technology landscape. Shelly strives to cultivate strong relationships with clients and markets.
- Shawn E. TumaCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Jonathan CiaramellaSr. Threat Intel Analyst, Fortune 500 Convenience Retail
Accomplished Senior Threat Intelligence Analyst and expert threat hunter with a robust background in cybersecurity, holding certifications in Penetration Testing and Bug Bounty. Proficient in Incident Response, Threat Hunting, Intelligence, Computer Forensics, Red Teaming, Penetration Testing, Vulnerability Assessment, and Audits. Skilled in designing SOCs, managing SIEM systems, conducting Risk Analysis, and developing Global Security Policies. Demonstrates expertise in Malware Analysis and Remediation, adept at enhancing security across complex IT environments to mitigate risks and protect organizational assets.
- Gabriel NwajiakuCommissioner, City of Austin's Community Technology and Telecommunications Commission
Gabriel Nwajiaku is a seasoned cybersecurity expert, army veteran, and community leader. Holding a diverse array of certifications including CISM, PMP, Security+, and CySA+, Gabriel brings a wealth of knowledge and experience to the table. His journey began in the military, where he honed his skills in strategic planning and risk management, serving his country with distinction.
After transitioning from the military, Gabriel continued his pursuit of excellence in cybersecurity, earning multiple certifications to further solidify his expertise. His commitment to continuous learning and professional development has enabled him to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats and challenges.
In addition to his impressive professional achievements, Gabriel is also deeply engaged in his community. As the Commissioner of the City of Austin's Community Technology and Telecommunications Commission, he plays a vital role in shaping policies and initiatives that promote digital inclusion and access to technology for all residents.
With a passion for empowering individuals and organizations to navigate the complexities of cybersecurity, Gabriel brings a unique perspective to the table. His insights into establishing purpose and direction in this nebulous terrain are sure to inspire and enlighten audiences at the conference.
- Happy Hour
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes