Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 1, 20259:00 am[PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Shady GroveAI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.
Lesson 1: What is Artificial Intelligence?
Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.Lesson 2: What are the AI threats?
Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.Lesson 3: What are the AI vulnerabilities?
Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.Lesson 4: What are AI security controls?
Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.Lesson 5: What is AI risk management?
Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data CardsLesson 7: What are the AI governance, AI compliance, AI audit requirements?
Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.Lesson 8: Building an AI security program
Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursvCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: HillhavenThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, October 2, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:30 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Working with the Board of Directors—a Strategic Imperative for Cybersecurity LeadersCyber | Data | Artificial Intelligence | Emerging Technology Practice Group Leader, Spencer Fane LLPRegistration Level:
VIP / Exclusive
8:00 am - 8:45 amLocation / Room: Spring GladeCome join this invitation-only roundtable discussion for Advisory Council members and select VIPs to discuss how to help equip cybersecurity leaders with insights and strategies to effectively engage with the Board of Directors on cybersecurity matters. Be a part of the conversation, learn, and share.
8:00 amNorth Texas ISSA Meeting and Guest Speaker (Open to all attendees)Cyber Horizon 2025: Engineering Brilliance in the Age of Intelligent AdversariesSVP, Technology & COO, Citi; President, North Texas ISSARegistration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: Northbrook 1-3As we enter a new era of digital warfare and systemic vulnerability, cybersecurity is becoming a strategic imperative in the digital world. This session explores the accelerating convergence of AI-driven threats, geopolitical cyber conflict, and supply chain fragility, revealing how these forces are reshaping the global security landscape. With governments adopting forward-operating cyber mandates and CISOs evolving into boardroom influencers, the defense paradigm is shifting from reactive protection to proactive resilience.
Let’s walk through five defining dimensions of today’s cybersecurity reality: the current state of cyber readiness, the fusion of emerging threats, strategic defense recalibrations, the governance evolution of the CISO role, and the urgent call for cross-sector collaboration. It challenges leaders to rethink risk, reframe governance, and recommit to collective action—because in the cyber domain, resilience is not a destination, but a shared journey.
8:00 amA Strategic Partnership in Cyber Defense: The InfraGard North Texas Members Alliance BriefingOpen to all attendeesSector Chief, Commercial Facilities, InfraGard North Texas Members AlliancePrivate Sector Intelligence Analyst, FBI DallasPresident, InfraGard North Texas Members AllianceRegistration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: FairviewJoin leaders from the InfraGard North Texas Members Alliance for an essential briefing on leveraging this vital public-private partnership. This session will provide an in-depth look at the InfraGard mission, covering national updates on membership and the streamlined process for information dissemination. We will detail the structure and purpose of the Sector Chief Program, highlighting opportunities for members to become more actively involved in their respective critical infrastructure sectors. The FBI Liaison will conclude the session by clarifying the FBI’s role in supporting InfraGard members and providing clear guidance on how to effectively communicate with local field offices, empowering you with the knowledge and connections needed to build a more resilient defense against cyber threats.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Securing the Big D and Beyond: Lessons in Leadership from Top CISOsGlobal Director, Cyber Defense, Threat and Vulnerability Management, CencoraCISO, MVB Financial Corp.CISO, City of PlanoSVP & CISO, InforRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Dallas and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 21st edition of SecureWorld Dallas.9:45 amNetworking Break & Cyber ConnectCome learn about BlackGirlsHack – Join this bonus session in the Networking HallRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallCome meet the local leadership for BlackGirlsHack, learn about what they do and how to join (anyone and everyone are welcome), and ask any questions you may have.10:15 amFrom Chaos to Control: Automating Cloud Security with AI InsightsCloud Security Engineering Team Lead, HumanaRegistration Level:
Conference Pass
10:15 am - 10:50 pmLocation / Room: FairviewThis presentation highlights the importance of using certified components, enforcing security controls with automated validation, and leveraging AI-driven insights for smarter and more efficient exception management. In modern cloud environments, trusted components and continuous validation accelerate secure application delivery and reduce misconfiguration risks. Automated security architecture validation ensures controls are consistently applied, enabling teams to detect drift early and respond with confidence. With AI-driven insights and exception management oversight, organizations can prioritize risks and streamline approvals. These combined practices empower businesses to move applications to the cloud faster, improve developer productivity, and maintain strong, scalable cloud security postures.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsChief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin CollegeInformation Security Advisory; Former CISO at HCSCSr. Director – GRC | Global Information Security, HiltonRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: Northbrook 1-3This panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.10:15 amRethinking Security for the Modern Enterprise: A Strategic Lens for Enterprise Security ProfessionalsSr. Solutions Architect, Cybersecurity, C1Registration Level:
Open Sessions
10:15 am - 10:50 amLocation / Room: Sunny SlopeAs digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.
We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.
Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.
Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.
10:50 amNetworking Break & Cyber ConnectCome learn about the WiCyS DFW affiliate – Join this bonus session in the Networking HallRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallCome by the networking lounge on the Exhibitor Hall floor to meet the local WiCyS DFW affiliate board, learn about what they do and how to join (men are welcome, too), and ask any questions you may have.
11:10 amLocking the Future: Why Data Security Is the Key to Trustworthy AIData Strategy and Data Information Architect, Bank of AmericaRegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: FairviewAs AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.
11:10 amEverything You Need to Know About Cyber Resiliency Can Be Learned from American FootballCyber Fellow, Aeronautics Cyber Range, Lockheed MartinRegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: Sunny SlopeIncrease your knowledge of cyber resiliency by examining it through the lens of American football. This presentation delves into the surprising parallels between the sport and cybersecurity, discussing themes such as teamwork, strategic planning, and continuous improvement. Discover how football’s principles can inform and enhance your organization’s cybersecurity posture, and learn how to “win the game” against cyber threats.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceCo-Founder & CEO, Dune SecuritySr. Inside Solution Engineer, TaniumDeputy CISO & Director of Cybersecurity Compliance, ChoreographRegistration Level:
Open Sessions
11:10 am - 11:45 amLocation / Room: Northbrook 1-3Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Bridging the Gap: The Role of the BISO in Modern CybersecurityHead of Global Business Information Security Office, CBRESr. Principal, Information Security, BISO, Mr. CooperSr. Cybersecurity BISO Analyst, CBREBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Registration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)AI and the Future Workforce: What Will It Look Like and What Do We Expect?Associate Director, Cybersecurity, VerizonRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: Spring GladeThis peer-to-peer roundtable discussion for Advisory Council members and VIPs explores the profound and complex impacts of AI on the future of the cybersecurity workforce. We’ll discuss: What is the evolving role of IT staff and management in an AI-driven landscape? Can the rise of Generative AI be compared to past technological shifts like the Luddite movement or manufacturing automation, and will it ultimately create new, unforeseen jobs?
We’ll also tackle some of the more uncomfortable trends, from students using AI for academic work to the potential for AI to “dumb down” society and diminish essential skills. The session is an open and candid conversation about the societal implications, ethical dilemmas, and practical challenges that AI presents to our industry and beyond.
12:45 pmNetworking Break & Cyber ConnectCome learn about the local Cyversity affiliate – Join this bonus session in the Networking HallDirector of Marketing & Memberships, Cyversity North TexasRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallCome by the Networking Hall right after lunch to meet the local Cyversity affiliate leadership and learn about their mission to achieve the consistent representation of women, underrepresented communities, and all veterans in the cybersecurity industry through programs designed to diversify, educate, and empower.
1:15 pmBridging the Privacy Divide: How Texas Is Catching up to CaliforniaPartner & Attorney, Pierson Ferdinand LLPRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: Sunny SlopeWith Texas leading a wave of new data privacy and cybersecurity legislation in recent years, organizations face rapidly evolving requirements. This session addresses the most significant changes to Texas law, including enactment of the Texas Data Privacy and Security Act and new cybersecurity safe harbor provisions. Attendees will also learn how other states are approaching privacy and security regulation.
1:15 pmSafeguarding Texas Critical Infrastructure Against AI-Powered Multi-Vector ThreatsProfessor of Practice, Computer Science & Engineering, Texas A&M UniversityData Integration Visualization Researcher, Texas A&M UniversityRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: FairviewThis session addresses the escalating threat to Texas’s critical infrastructure from AI-powered, multi-vector cyberattacks. As digital and physical systems converge, adversaries are leveraging advanced AI to orchestrate sophisticated campaigns that exploit vulnerabilities across multiple domains simultaneously—from energy grids and water utilities to transportation networks.The presenters showcase a novel, evidence-based framework for threat mitigation that moves beyond single-point defenses to a holistic, resilient architecture. The approach integrates AI-driven anomaly detection, real-time threat intelligence from human-in-the-loop systems, and a coordinated, cross-sector response protocol. The framework’s core is its ability to predict and counter multi-stage threats by analyzing adversarial behavior and attack patterns, thereby strengthening the defensive posture of Texas’s vital infrastructure. The research offers actionable recommendations for policymakers and utility operators, advancing the state of practice in cyber-physical security in the era of AI.1:15 pmSecuring the Pipeline: Cyber Data Delivery for Real-Time Threat IntelligenceSr. Data Security Analyst, Capital OneRegistration Level:
Open Sessions
1:15 pm - 1:50 pmLocation / Room: Northbrook 1-3In today’s digital landscape, data is both an asset and a vulnerability. This session explores how organizations can harness Cyber Data Delivery and Machine Learning to proactively detect, analyze, and mitigate threats in real time. Drawing from real-world experience, a seasoned data engineer and cybersecurity expert, will walk through strategies to build secure, scalable data pipelines that enable rapid threat intelligence and actionable insights. Attendees will gain a deeper understanding of how to integrate advanced analytics into their security stack and turn raw data into a powerful defense mechanism. Key takeaways include:-
How to build secure and efficient cyber data pipelines
-
Applying machine learning models for threat detection
-
Overcoming real-world challenges in cyber data engineering
-
Best practices for data-driven cyber defense strategies
This session is ideal for security professionals, data engineers, and tech leaders looking to level up their threat intelligence and data security capabilities.1:50 pmNetworking Break & Cyber ConnectWhat Is AI Governance and What Does It Mean to You? Join this bonus session in the Networking HallAssociate Attorney, Spencer Fane LLPCyber | Data | Artificial Intelligence | Emerging Technology Practice Group Leader, Spencer Fane LLPRegistration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallWith the proliferation of AI, governance is not just important, it is imperative. Come by the Networking Hall and join the conversation. This session will demystify AI governance, breaking down what it is, why it’s critical for cybersecurity professionals, and how to build a practical framework for its implementation in any organization.
2:10 pmCyversity North Texas Chapter Meeting and Guest Speaker (Open to all attendees)Getting into Cybersecurity: Baby Steps for SuccessCybersecurity Career Coach, Cyber Potential, Director of Career Services, Cyversity North TexasDirector of Partnerships and Sponsorships, Cyversity North TexasPresident, Cyversity North TexasRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: Sunny SlopeThis presentation will educate attendees on the right strategy and proven steps to get into cybersecurity.
2:10 pmAI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security LeadersSr. Security Engineer, Exeter Finance LLCLead IT Security Engineer, Tyson FoodsRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: FairviewAs quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?2:10 pm[Panel] Proactive Security: Building Digital Fortresses Against Modern DragonsVP of Strategic Accounts, SeceonVP of Strategy, SixMapDirector, Security & Compliance, Overhead Door CorporationRegistration Level:
Open Sessions
2:10 pm - 2:45 pmLocation / Room: Northbrook 1-3In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.
This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.
Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityFocus Areas: Leadership, Decision Making, and CommunicationCISO, AkuminCISO, TaxwellCISO, City of ArlingtonRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.Expect candid insights on topics such as:-
The toughest decisions CISOs face daily
-
Emerging threats and how security leaders are preparing
-
The future of security operations, compliance, and resilience
-
Strategies for bridging the gap between security teams and executive leadership
-
Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.3:45 pmDash for Prizes and Happy HourRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Keynote TheaterStick around after the closing keynote as we announce the winners of SecureWorld’s Dash for Prizes giveaways—did your name make the list? Then raise a glass with us during Happy Hour as we celebrate a successful day of learning, networking, and collaboration.
- BlackGirlsHackBooth: 370
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- BlinkOpsBooth: 260
Automate all things security in the Blink of AI.
BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.
Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.
Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.
- C1 | CiscoBooth: 200
C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- Cyversity North TexasBooth: 160
Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.
- Dune SecurityBooth: 300
Security Awareness Training is Dead.
Dune Security is replacing legacy phishing simulations and security awareness training tools with a unified, automated User Adaptive Risk Management platform. It delivers User Adaptive Testing, Training, and Security to reduce administrative burden and mitigate risk. Unlike one-size-fits-all SAT models, Dune tailors security measures to each individual using intrinsic data (role, tenure), behavioral insights (red team testing), and analytics from a broad range of integrations (IDAM, EDR, DLP).
- HackNoticeBooth: 250
HackNotice not only unifies your threat intel needs in one place, but optimizes and maximizes your threat defenses in ways that no other platform can.
Whether that’s searching for any term you need, tracking the full range of compromised PII, getting real-time alerts for every hack and leak, or any of our other advantages, HackNotice is the industry standard for threat intel.
- HUMAN SecurityBooth: 210
HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.
- InfraGard North Texas Members AllianceBooth: 150
The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:
- Local quarterly membership meetings focused on infrastructure protection
- Sector-specific meetings and information exchanges (see Sector Chief Program).
- Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
- Networking opportunities with peers within and across all sectors
- ISC2 Dallas-Fort Worth ChapterBooth: 350
The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.
- Association of Continuity Professionals (ACP) North TexasBooth: 230
ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.
Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week. We invite you to attend our next meeting.
- KeysightBooth: 110
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- Legato SecurityBooth: 130
Our mission is to provide comprehensive, customer-centric managed cyber security services that effectively manage and mitigate cyber risks on behalf of our customers. We continually adapt and innovate our services to stay ahead of emerging threats and evolving technologies, delivering peace of mind and enabling our customers to focus on their core business objectives. With a team of dedicated experts and cutting-edge technologies, we strive to build trusted partnerships, deliver exceptional value, and safeguard our customers’ digital assets with unwavering commitment.
- North Texas ISSABooth: 235
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.
- Ovalix, Inc.Booth: 165
Ovalix empowers organizations to confidently embrace AI technology by mitigating associated risks such as data leakage, malicious prompts, shadow AI, and regulatory non-compliance across AI applications ranging from basic LLMs to sophisticated AI Agents. By ensuring robust security, maintaining regulatory integrity, and preventing data breaches, Ovalix enables organizations to unlock the transformative power of AI with peace of mind.
- Seceon Inc.Booth: 330
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.
What Sets Seceon Apart:
- Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
- AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
- Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
- Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.
Why Organizations Choose Seceon:- Cut cybersecurity costs by 60% by replacing siloed tools
- Stop threats faster with AI-powered detection and automated response.
- Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.
Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- SecPod Technologies, Inc.Booth: 140
SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
• Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
• Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.
- SixMapBooth: 220
SixMap provides the most accurate and complete external view of your organization—no input required, just the company name. Our preemptive exposure management platform inspects all 65,535 ports as standard operating procedure—across IPv4 and IPv6— continuously hunting unknown assets, misconfigurations, and blindspots other tools miss. Built for security teams tired of tools that assume too much and miss even more, SixMap replaces guesswork with precision. So you can act faster, reduce exposure, and see what attackers see.
- Sumo LogicBooth: 310
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- TaniumBooth: 340
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
- ThreatLockerBooth: 320
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- U.S. Secret Service – Cyber Fraud Task ForceBooth: 240
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- WiCyS Dallas Forth Worth AffiliateBooth: 360
- North Texas ISSABooth: 235
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.
- Zafran SecurityBooth: 270
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson CyberLarry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Shawn E. Tuma, ModeratorCyber | Data | Artificial Intelligence | Emerging Technology Practice Group Leader, Spencer Fane LLPShawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
Amy ChaneySVP, Technology & COO, Citi; President, North Texas ISSAAmy Chaney is a recognized security, technology and transformation executive leader with decades of experience in highly sophisticated and evolving financial environments. By architecting innovative ecosystems across cybersecurity, risk management, and evolving technologies, Amy brings deep expertise in identity systems, quantum-resilient architecture, and AI-driven security strategies and complex transformation initiatives that redefine digital trust and sovereignty.
Amy is experienced in organizationally imperative initiatives to modernize infrastructure, strengthen security, and employ modern solutions like artificial intelligence, and post-quantum security into scalable, future ready change to enhance resilience and prevent emerging threats.
Known for mobilizing elite global teams and catalyzing change with speed and vision, Amy’s influence spans corporate boardrooms, international think tanks, and high-stakes regulatory domains. Her leadership consistently delivers measurable outcomes, shaping secure, intelligent ecosystems for a rapidly evolving world.
Amy proudly serves as the President for the largest and flagship North Texas chapter of ISSA. International Systems Security Association is committed to promoting effective cybersecurity on a global basis through 150 chapters globally.
Michael DeHavenSector Chief, Commercial Facilities, InfraGard North Texas Members Alliance
Ashley GrooverPrivate Sector Intelligence Analyst, FBI Dallas
Jayaprakash (JP) Reddy CheenepalliGlobal Director, Cyber Defense, Threat and Vulnerability Management, CencoraJayaprakash Reddy Cheenepalli (JP) is an accomplished cybersecurity leader with extensive experience in managing and securing enterprise-wide IT systems. As a Director of Cybersecurity, he specializes in Cyber Defense, Cyber Engineering, Threat and Vulnerability Management, Application Security, Governance, Risk Management, and Compliance, ensuring robust protection against evolving cyber threats. With a proven track record of implementing innovative security strategies, JP is committed to fostering a culture of security awareness and delivering measurable value through effective risk mitigation.
Parrish GunnelsCISO, MVB Financial Corp.Parrish is currently the CISO at MVB Financial Corp. and is the former SVP & CISO of Sunflower Bank. He has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information security. His experience also includes working in multiple industries including financial services, telecommunications, chemical manufacturing, real estate, and retail. In addition, he has worked in both global Fortune 500 companies and small start-up-based companies.
During his tenure as a CISO, he has been involved in the creation, staffing, building, and management of comprehensive information security programs for various companies across diverse locations and personnel. In all these companies, he has implemented programs based on risk and threat analysis and has implemented controls, services, and processes that have not only met the needs of the company but also the regulatory and compliance requirements of the company including incident response capabilities.
Parrish holds a Master of Business Administration from Texas Christian University and certifications as a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), and Professional Project Manager (PMP).
Chandan KochharCISO, City of Plano
Mignona Coté, ModeratorSVP & CISO, Infor
BlackGirlsHack Representative
Santosh Datta BompallyCloud Security Engineering Team Lead, HumanaSantosh Bompally is a dedicated cybersecurity professional with a degree in Computer Science and a Master’s in Cybersecurity. He holds several certifications, including CISSP and CCSP, and currently leads cloud security engineering initiatives at Humana, focusing on security controls for multi-cloud environments. Before joining Humana, Santosh gained valuable experience in various industries and made significant contributions to a cybersecurity startup specializing in comprehensive services. He is actively involved in the cybersecurity community, participating in ISACA and (ISC)² circles, speaking at industry meetups, and contributing to publications from the Cloud Security Alliance, sharing his insights to foster collaboration in cybersecurity.
Dr. Kimberly KJ HaywoodChief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin CollegeMs. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.
Ian SchnellerInformation Security Advisory; Former CISO at HCSCWith more than 34 years of experience in information security and executive leadership, Ian Schneller has built a career advancing strategic cybersecurity and resilience across government, defense, finance, and healthcare sectors. His background includes three tenures as a large enterprise Chief Information Security Officer (CISO) and recognition as the first CISO ever to win the national ORBIE Award.
Most recently, he served as CISO for HCSC and as a Board Director on the Blue Cross Blue Shield (BCBS) Association Cybersecurity Subcommittee (2021–2025), strengthening protections for a system that supports healthcare for one in three Americans. During this time, Ian also partnered with other senior executives at HCSC to create an organizational wide artificial intelligence governance process (of which he served too) to ensure fair, transparent, and secure use of artificial intelligence.
Ian also served as a fiduciary Board Director for Medecision and as Board Chair for “Dallas CISO Inspire”, bringing together more than 30 regional CISOs to uplift collective cyber defenses. In prior private-sector roles, Ian partnered with the Federal Government to shape national cybersecurity policy, including co-founding the Analysis and Resilience Center, a public-private partnership dedicated to protecting the United States from catastrophic foreign cyber attacks.
A retired U.S. Air Force officer with nearly 24 years of service as a cyber defender, cyber attacker, and senior intelligence officer, Ian has advised the U.S. Congress on cybersecurity priorities and led major initiatives to secure critical infrastructure from cyber attacks and to enhance the nation’s most sensitive intelligence capabilities.
Certifications: Certified Information Systems Security Professional (CISSP); Certified in Risk and Information Systems Control (CRISC); Information Systems Security Engineering Professional (ISSEP); Qualified Technical Executive (QTE – digital/cyber board director); Private Director Association Certificate; Wharton Corporate Governance Certification; and Corporate Governance Institute Board Director Certification with additional qualifications in governing Artificial Intelligence, Cyber, and Digital Transformation
Chad ThiemannSr. Director – GRC | Global Information Security, HiltonChad Thiemann has 14 years of active duty and national guard service as an Army Logistics Officer and is a combat veteran. He has been in Corporate America for over 26 years where he has served in various roles
spanning cybersecurity, privacy, and risk management. Chad currently serves as the Sr. Director of GRC – Global Information Security at Hilton.Prior to Hilton, Chad had an eighteen-year tenure at CVS Health with varying roles: IT Audit Sr. Manager, Director - Information Governance & Privacy Operations, Lead Director -
Cyber Defense, and as a BISO. Chad also has held cybersecurity related roles at Arthur Andersen and Merck Pharmaceuticals before arriving at CVS Health. For the past seven years, Chad has served as an Adjunct Professor of Cybersecurity for the Carter Graduate College of Business at Dallas Baptist University. Chad has undergraduate degrees in MIS and Operations Management & Logistics from Boston University.
Additionally, Chad has a graduate certificate in ‘Cybersecurity: Technology, Application & Policy’ from MIT and an Executive Masters in Cybersecurity from Brown University.Through the military, Chad completed various graduate level programs in leadership, strategy, and logistics from the Army Logistics Management
College; Command & General Staff College; and the Naval Postgraduate School. Chad enjoys reading, travel, wine, soccer, and ice hockey. Chad and his wife currently reside in Plano, TX.
Caheen MurphySr. Solutions Architect, Cybersecurity, C1Caheen Murphy is a highly experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.
Women in CyberSecurity (WiCyS) DFW Affiliate, Host
Jennifer FiteData Strategy and Data Information Architect, Bank of AmericaExperienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.
Teresa MerklinCyber Fellow, Aeronautics Cyber Range, Lockheed MartinTeresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, an MBA in Information Assurance from the University of Dallas. She is a CISSP and CSSLP.
David DellaPelleCo-Founder & CEO, Dune SecurityDavid DellaPelle is the Co-Founder and CEO of Dune Security. With a visionary yet pragmatic approach, he leads Dune in tackling one of today's most pressing enterprise challenges: employee-based cyber risks. David holds a BS in Economics and Management from Cornell University and an MBA from NYU, where he received the prestigious Andre Koo Tech Scholarship. He drove security product innovation and revenue growth at leading cybersecurity and AI companies, including Perimeter 81, At-Bay, and Waycare, following an early career in management consulting at EY.
Doug MitchellSr. Inside Solution Engineer, TaniumDoug Mitchell is an Air Force veteran with a background in security operations & engineering. Leveraging expertise in vulnerability management, incident response, and threat detection, he now serves as a solution engineer at Tanium helping reduce enterprise risk. Doug holds a Masters in Cybersecurity and various certifications, including CISSP, CCSP, and GCIH.
Joe Paul, ModeratorDeputy CISO & Director of Cybersecurity Compliance, ChoreographJoe Paul is a seasoned Information Technology and Cybersecurity leader, currently the Deputy Chief Information Security Officer and Director of Cybersecurity Compliance for Choreograph, A WPP Media Brand. Choreograph is the big data and ad tech subsidiary of WPP Group, the most extensive worldwide advertising, media, and public relations conglomerate. Joe earned his Master of Business Administration in Marketing and Finance from Nova Southeastern University in Fort Lauderdale (Florida) and a Bachelor of Science in Computer Science from CUNY College of Staten Island (New York). He holds numerous professional certifications in Information Security, Risk Management, Governance, Disaster Recovery, and Project Management. Joe is an active member of multiple professional organizations and associations, including ISSA, InfraGard, ISACA, and ISC2. In his spare time, he is an avid photographer and automobile enthusiast.
Janie AggasHead of Global Business Information Security Office, CBREJanie Aggas is the Head of Global Business Information Security Office (BISO) at CBRE. She is a visionary information security leader and change agent with an impeccable record spanning 20+ years, contributing to technology transformations and cybersecurity strategies to solve complex business challenges while reducing risk for Fortune 500 companies. She is recognized as a passionate leader and trusted advisor for the C-suite, business, technology teams, and with partners such as compliance, legal, privacy, risk, and internal audit. She is no stranger to protecting valuable assets having begun her technology career in the defense industry and spending 10+ years in the financial services industry prior to her transition to CBRE. She earned a BBA in Computer Information Systems and an MBA from West Texas A&M University and recently completed an MLS in Cybersecurity Law & Policy from Texas A&M School of Law.
Shannon AlbrightSr. Principal, Information Security, BISO, Mr. Cooper
Marivell Alicea-GamlinSr. Cybersecurity BISO Analyst, CBREMarivell Alicea-Gamlin is a Senior Cybersecurity BISO Analyst at CBRE, where she connects cybersecurity strategy to business outcomes through client assurance, audit support, and third-party risk engagement. With more than 20 years of experience across IT operations, governance, and compliance, she plays a key role in shaping cyber strategy and building client trust. Marivell serves on the board of ISSA Puget Sound as Director of Membership and actively mentors emerging cybersecurity professionals. She holds a Master’s in Network and Communications Management, is ISC2 Certified in Cybersecurity (CC), and brings a global perspective with fluency in Spanish and developing proficiency in Portuguese.
Elvis Moreland, ModeratorBISO/CISO, ILIAS Federal Solutions (IFED), Inc.Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.
Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.
Stephen Pettit, ModeratorAssociate Director, Cybersecurity, VerizonSteve Pettit, an Associate Director at Verizon, holds a Masters of Science in Cybersecurity and CISSP certification, bringing more than 35 years of cybersecurity experience, with 25 of those years dedicated to Application Security. He has been a pivotal figure in the field, evangelizing the space, creating tools like AppScan and the first Application Firewall, while developing concepts such as the Positive Security model. A popular speaker, patent holder, and author. Steve has spent the last 15 years at Verizon, where he and his team established a world-class Static Analysis Security Testing process, widely regarded as the industry's best. Currently, he leads four teams: SAST, OSS UI, Secrets Detection, and AppSec Event Management. Steve is actively leveraging AI to tackle complex problems and advance Application Security, with a keen interest in AI's transformative impact on the role of Application Security professionals.
David Renteria, HostDirector of Marketing & Memberships, Cyversity North TexasDavid is a U.S. Army veteran who served as a Systems Administrator and Information Assurance Security Officer for more than 10 years. He has led teams in the planning, configuration, and management of both tactical and commercial radio and computer networks. After transitioning from the Army, he used his growth mindset to upskill and prepare for his next career. He’s currently serving as the JROTC Senior Cyber Instructor where he educates, trains, and mentors high schoolers as they prepare for future careers as cybersecurity professionals. He continues being a lifelong learner as he’s currently participating in graduate level certifications and technical certifications. When he's not inspiring youth or improving his skill set, he enjoys spending time and traveling with his wife and three children.
Jeremy RuckerPartner & Attorney, Pierson Ferdinand LLPJeremy Rucker is a partner in the law firm Pierson Ferdinand LLP and leads businesses through the evolving and complex landscape of data privacy, security, and incident response. Jeremy regularly counsels clients in all industries on the emerging federal, state, and international data laws and regulations and also serves as a breach coach to guide organizations of all backgrounds through national data breach notification processes and resultant regulator investigations.
Jeremy is certified by the International Association of Privacy Professionals as a Privacy Law Specialist, and holds certifications as a Certified Information Privacy Professional for United States law (CIPP/US) and European law (CIPP/E).
Shreyas KumarProfessor of Practice, Computer Science & Engineering, Texas A&M UniversityShreyas Kumar is a Professor of Practice in Computer Science & Engineering at Texas A&M University, specializing in Cybersecurity, AI, and Risk Management. With 22 years of industry experience, he has held security engineering and leadership roles at Uber, Adobe, and Oracle. His research focuses on cyber warfare and AI-driven security.
Hiya SharmaData Integration Visualization Researcher, Texas A&M UniversityHiya Sharma is currently working as a researcher at Texas A&M University, where she is also an Honors Computer Science student pursuing a minor in Business. She has worked on projects involving AI-powered anomaly detection, blockchain-based data integrity, and real-time analytics pipelines for industries including agriculture and cybersecurity. Her experience includes internships in AI software engineering, sustainability analytics, and research in data integration and visualization. Hiya’s current work explores how emerging technologies such as AI and blockchain can impact the security and resilience of critical infrastructure.
Dr. Geethamani JakkaSr. Data Security Analyst, Capital OneGeethamanikanta Jakka (Mani Jakka) is an experienced Data Engineer with a strong focus on Cyber Data Delivery, Threat Analysis, and Machine Learning. With a proven track record of building secure, scalable data infrastructure, he combines deep technical knowledge with a passion for cybersecurity innovation. Mani has led critical data initiatives in high-impact environments, helping organizations proactively detect threats, optimize data pipelines, and apply intelligent analytics for real-time decision-making. He is also an advocate for responsible AI and open-source collaboration in the cybersecurity domain.
Christine ChasseAssociate Attorney, Spencer Fane LLP
Shawn E. TumaCyber | Data | Artificial Intelligence | Emerging Technology Practice Group Leader, Spencer Fane LLPShawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
Gladys AjihCybersecurity Career Coach, Cyber Potential, Director of Career Services, Cyversity North TexasGladys is a seasoned Cybersecurity Career Coach and professional with a passion for family and changing lives. As the founder of Cyber Potential and Director of Career Services for Cyversity, she helps mentor aspiring Cybersecurity professionals with a goal of helping them have a better future.
Harry Lu, Co-HostDirector of Partnerships and Sponsorships, Cyversity North TexasHarry Lu is a seasoned and action-oriented Cybersecurity practitioner specialized in security and privacy advisory. He is a strategic thinker with hands-on implementation experience supporting the growth of security and privacy programs at top global companies. Harry is committed to helping organizations securely embark their digital transformation journey and elevate their customer trust at the speed of business.
At Cyversity North Texas, Harry is responsible for building out the Chapter's sponsorship and partnership relationships with organizations in the industry that share the passion and vision of Cyversity.
Renaldo McKenzie, Co-HostPresident, Cyversity North TexasRenaldo McKenzie is a seasoned professional & security leader with a diverse background of proven success in various industries and critical infrastructure sectors.
His knowledge and expertise are in program development, management, and advancement of Governance, Risk, and Compliance, Identity & Access Management, and Awareness Education & Training where he has successfully developed, managed, and transformed several organizational security programs through collaborative stakeholder engagement to drive change, alignment with business objectives, and scalability.
In addition to his professional experience, Renaldo often gives back to the industry and community by serving as an advisor, mentor, and ambassador for several individuals and organizations.
Ankit GuptaSr. Security Engineer, Exeter Finance LLCAnkit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.
Shilpi MittalLead IT Security Engineer, Tyson FoodsShilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.
Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.
Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.
Chris BellVP of Strategic Accounts, SeceonIT and managed security sales specialist with over fifteen years of experience. Proficient at gathering business requirements, analyzing business needs, and presenting technology strategies and solutions that align with business objectives. My main goal is to help the enterprise increase user productivity, decrease risk and control costs.
Specialties: Cybersecurity, EDR, MDR and XDR services, Managed aiSIEM, Penetration Testing & Vulnerability Assessment, Managed IT Services, Virtualization, Data Storage and Protection, Data Center Solutions, Disaster Recovery Expertise and Network Infrastructure Solutions.
Larry SlusserVP of Strategy, SixMapLarry Slusser is the Vice President of Strategy for SixMap. A former Air Force Officer, Larry has built his career responding to and preventing sophisticated cyber attacks through continuous cyber risk assessment, vulnerability monitoring, and mitigation strategies. Most recently at SecurityScorecard, he led their Global Cyber Risk Solutions Team innovating Scorecard’s MAX offering, a Supply Chain Detection and Response tool. Larry has developed market leading strategic and tactical roadmaps aligning technical service offerings with customer needs across digital forensics, incident response, and ransomware mitigation. His leadership spans people, process, and practice excellence, developing operational infrastructure and highly skilled global teams that drive cybersecurity innovation.
Leslie Saravia, ModeratorDirector, Security & Compliance, Overhead Door Corporation
Fred ClaytonCISO, AkuminAs a seasoned Chief Information Security Officer, Fred specializes in driving cybersecurity strategies that protect enterprise ecosystems while enabling business growth. With expertise in financial tech, healthcare, and government verticals, he has built and led robust security frameworks tailored to the unique challenges of these industries.
His approach combines strategic vision with technical insight, encompassing risk management, threat intelligence, incident response, and regulatory compliance. He excels at collaborating with stakeholders at all levels, translating complex security challenges into actionable solutions that align with organizational objectives.
Whether navigating stringent regulatory landscapes or safeguarding sensitive data, Fred thrives in dynamic environments where innovation, resilience, and leadership converge to ensure secure, sustainable success.
Elaine FleschCISO, TaxwellElaine Flesch is an accomplished cybersecurity and technology executive with experience in leading global cyber and risk programs. She is the Chief Information Security Officer at Taxwell (a leading digital tax filing platform). She also serves as an Executive Board Member to TXCPA and an Advisory Board Member to the University of Texas at Dallas MS Accounting program. Elaine has an MBA from The University of Texas at Dallas. She also has a Master and a Bachelor of Science in Computer Science from UFMG (Brazil). She is a licensed Certified Public Accountant (CPA) in the state of Texas. She actively holds multiple professional and cybersecurity certifications, including the National Association of Corporate Directors’ Directorship Certified (NACD.DC), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM).
Bryce Carter, ModeratorCISO, City of ArlingtonBryce Carter is the Chief Information Security Officer for the City of Arlington, Texas, a major city known for its world-class entertainment district, where he leads an enterprise security office overseeing all critical infrastructure and essential services. He holds approximately 20 years of executive leadership experience across government, aviation, healthcare, utilities, and technology services. Recognized as a 2025 ORBIE Award Winner and named a Top 100 CISO Globally in 2025, he also serves on numerous advisory boards, mentors new and emerging leaders, and commits much of his time to the outdoors.
Happy Hour
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes









