- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, October 9, 20249:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: DelaplaineHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, October 10, 20247:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Breakfast Roundtable (VIP / Invite Only)Lessons from Recent Vendor Incidents and Strategies for ResilienceCISO, InsurityRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amLocation / Room: SaemanThis session is for SecureWorld Advisory Council members only.
Recent incidents involving major cybersecurity vendors like CrowdStrike and Microsoft have highlighted the critical issue of single-point failures in our digital defense ecosystems. Let’s discuss the aftermath of these events and explore the broader implications for organizational cybersecurity strategies, including:
- The dangers of over-reliance on single vendors: Explore the risks of putting all your security eggs in one basket.
- Developing a multi-vendor strategy: Balancing the benefits of integrated solutions with the need for redundancy and resilience.
- Incident response planning: Preparing for vendor-related outages or failures as part of your cybersecurity strategy.
- Future outlook: How the industry might evolve to address these challenges.
Gain valuable insights into creating more resilient security architectures that can withstand vendor-specific incidents.
8:00 amISSA Chapter Meeting [Open to all attendees]A Look at Pig Butchering: A Crypto Contributor to $4.5B of Investment Scam Losses AnnuallyInvestor, Mentor, Volunteer, and EntrepreneurRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: Barbara Bresnan BoardroomPatrick will focus on the dangers of phishing, BEC, and social engineering and its impact on business and personal lives. He will discuss personal experiences about family members who were pig butchered and hit with identify fraud. And he will close with a discussion of the dangers and weaponization of AI in cybercrime and the defense-in-depth measures that organizations can take to protect employees with the latest AI email and communications security.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of ConflictCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThis informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.
Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.
He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsCSO, Traceable AIResident Magic GirlMember, Board of Directors, Colorado Technology AssociationCo-Founder, Mind Over Cyber, Podcast Co-Host, Bare Knuckles & Brass TacksRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: Barbara Bresnan BoardroomThis panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.10:15 amWhat's More Complex, the Internet or the Galaxy?The Intersection of Cybersecurity and SpaceDirector of IT Security, York Space SystemsRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: DelaplaineSession description coming soon.
10:15 amThe Pragmatic CISO: Where to Start When You Don't Know Where to StartDenver Club Host, The Cyber Breakfast ClubRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: ACA/Triax RoomAmidst today’s constant stream of data breaches and escalating regulatory demands, cybersecurity has become a top concern for both IT and business leaders. Join us to discover practical strategies for aligning your business objectives with an effective risk management approach, safeguarding and enhancing both your company’s and your customers operations.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amPrivacy for Security Professionals: Protecting Data in a Time of UncertaintyMember, Data Privacy & Cybersecurity, Clark Hill LawRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: DelaplaineIt feels like every day a new privacy law is enacted by the states, new regulations are issued by federal regulators, and then those regulations are overturned by the courts once challenged. This session explores how businesses can roll out sound data privacy practices in a time of so much legal uncertainty.
11:10 amSecuring Our World: CISA, Cybersecurity, and YouRegional Director, Region 8, DHS CISAColorado Cybersecurity Coordinator, DHS CISARegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: ACA/Triax RoomSession description to come.
11:10 am[Panel] Unveiling the Threat Landscape and Unmasking Digital VillainsVice President, SavvyMySQL Master Principal Solution Engineer, OracleSolutions Architect, CyberArkDigital Security Consultant, Americas DPS, EntrustDirector of System Engineering, Rockies Enterprise Team, FortinetBoard Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of DenverRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: Barbara Bresnan BoardroomIn the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.
Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.
Our panel provides a comprehensive overview of the current threat landscape.
12:00 pm[Lunch Keynote] Building Cyber Resilience Through Leadership and the Power of PerspectiveCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession description coming soon.
12:00 pmAdvisory Council Lunch Roundtable (VIP / Invite Only)How to Secure Your Organization from Internal and External Identity-Based ThreatsVice President, GuruculRegistration Level:- VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: SaemanDo you know if a threat is an Insider Risk or a Compromised Identity? Securing your organization from identity-based threats is paramount to reducing cyber risk. Security operations teams need the tools to help them quickly determine if they are dealing with a true insider threat or a compromised account. It’s important to link identity, access and activity to achieve clarity about gaps and risks that insider or external threat actors can exploit. In this closed-door, peer-to-peer discussion, we will discuss ways to combat these threats, reduce the attack surface, manage risk, and protect your enterprise.
Advisory Council roundtable discussion moderated by:
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmA Risk Management Strategy for AI that Won't Drive You BananasMember, Board of Directors, Colorado Technology AssociationRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: DelaplaineAI is the fourth event horizon of our technology lifetime ! Karen will provide an AI backgrounder and share the risk management strategy that will ensure you aren’t caught in the compliance hamster wheel of pain as legislators and regulators respond to the explosive AI revolution.
1:15 pmBuilding a Robust Privacy Framework: Mastering ‘Forget Me’ and Subject Access RequestsExecutive Director of Cybersecurity & Infrastructure, Focus on the FamilyRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: ACA/Triax RoomIn today’s data-driven world, organizations face increasing pressure to protect personal information while complying with complex privacy regulations. This session offers practical insights and strategies for developing a comprehensive privacy program that effectively manages ‘Forget Me’ requests and Subject Access Requests (SARs). Drawing from real-world experiences, we’ll explore how to leverage people, processes, and technology to create a privacy framework that meets regulatory requirements and builds trust with customers and stakeholders.
Key Takeaways:
- Roadmap to Success: Learn how to develop a strategic project roadmap for implementing a robust privacy program, including key milestones and dependencies.
- Streamlined SAR Management: Discover efficient processes for handling Subject Access Requests, from initial receipt to final delivery of information.
- Effective ‘Forget Me’ Protocols: Explore best practices for implementing and managing data erasure requests in compliance with GDPR and other privacy regulations.
- Data Discovery and Classification: Understand techniques for conducting thorough data inventories and classification to support privacy initiatives.
- Technology Integration: Learn how to leverage technology solutions to automate and enhance privacy processes, including data mapping and request management.
- Training and Culture: Develop strategies for fostering a privacy-aware culture through comprehensive employee training and engagement.
- Balancing Compliance and Operations: Gain insights on striking the right balance between regulatory compliance and operational efficiency.
- Continuous Improvement: Explore methods for monitoring, auditing, and continuously improving your privacy program to adapt to evolving regulations and threats.
This session will equip privacy professionals, IT leaders, and compliance officers with actionable strategies to enhance their organization’s privacy posture and effectively manage data subject rights in an increasingly complex regulatory landscape.
1:15 pmGetting Rid of the Gobbledygook in CybersecurityFounder, PopCykolRegistration Level:- Open Sessions
1:15 pm - 2:00 pmLocation / Room: Barbara Bresnan BoardroomCybersecurity can often feel like an exclusive club, shrouded in complex terms and technical jargon. This interactive discussion will focus on reframing and reimagining how we communicate about cybersecurity to make it more accessible, especially for non-native speakers and those new to the field. We will break down common industry terminology into simple, digestible pieces, to better understand essential concepts. By demystifying the language of cybersecurity, we aim to empower more people to engage with online safety, fostering a more inclusive environment where everyone can become fluent in the basics needed to stay safe online and contribute to securing our world.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmHow to Build Trustworthy and Secure AI Systems: Key Frameworks & Vulnerabilities You Need to KnowPrincipal | ISO Practice Director | AI Assessment Leader, SchellmanDirector, Penetration Testing Team, SchellmanRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: DelaplaineThe advancements of artificial intelligence (AI) have taken both popular culture and almost every industry by storm, due to the technology’s far-reaching abilities to augment human skills and bring safety and efficiency to several areas of our everyday lives. But these systems also bring with them a wealth of challenges, from ethics to security. We must be just as concerned about an organizations’ use of AI in critical workflows as we should be about LLMs disclosing sensitive data. How we evaluate these systems security, resilience, and robustness will be driven by well-established bedrock principles in both audit and assessments.
2:10 pmEmbracing ‘Yes’: Empowering New Cybersecurity Engineers to ThriveTechnical Security Engineer, YahooRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: ACA/Triax RoomAre you a leader dealing with an increasing number of new engineers starting their first cybersecurity roles? You’re not alone! Many new cybersecurity engineers face imposter syndrome and are hesitant to be open with their leaders, which slows down their growth and work output.We have always heard saying ‘yes’ can open unexpected doors and lead to diverse opportunities. This has been true for me. Come join me as I share my journey from graduation to navigating the challenges of entering the industry, emphasizing the transformative power of embracing the “yes” attitude that helped me overcome new challenges and experiences.I’ll discuss how I conquered imposter syndrome, improved my skills through real-world scenarios, and connected with people who could help enhance my skill set—all by embracing one simple word—YES!Furthermore, I’ll share how leaders can support their new hires by promoting the “Yes” mentality and its benefits. This helps them embrace new opportunities, leverage diverse experiences, and evolve with each challenge.Let’s collaborate to create a thriving community of confident and capable cybersecurity professionals.2:10 pmRecent Cybercrime Trends by the U.S. Secret ServiceNetwork Intrusion Forensic Analyst, U.S. Secret ServiceRegistration Level:- Open Sessions
2:10 pm - 2:55 pmLocation / Room: Barbara Bresnan BoardroomWe’ll discuss trends in e-fraud, cybercrime , and the evolution of recent attacks in the Rocky Mountain region.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Radical Transparency Needed to Build TrustCISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks PodcastCo-Founder, Mind Over Cyber, Podcast Co-Host,, Bare Knuckles & Brass TacksRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterSession description coming soon.
- AnvilogicBooth: 230
Anvilogic is a cloud-based modern Security Operations Platform for threat detection, investigation, and incident response (TDIR) to optimize and unify the detection, hunting, and triage lifecycle to more efficiently and effectively respond to threats across hybrid and multi-cloud workloads and security data lakes.
- baramundi software USA, Inc.Booth: 140
baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.
The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs.
Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution.
- Colorado Technology AssociationBooth: 390
The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.
At the Colorado Technology Association, we:
– Lead an inclusive network that benefits our member community
– Advocate for a pro-business and technology-friendly climate
– Influence the development of a robust talent pipeline
– Lead initiatives to help companies grow. - CyberArk SoftwareBooth: 340
CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.
- CyberhavenBooth: 300
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- EntrustBooth: 220
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.
- FortinetBooth: 210
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
- GuruculBooth: 250
Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Cloud-native Next-Gen Security Analytics and Operations Platform provides customers with Next Generation SIEM, UEBA, Open XDR, and Identity & Access Analytics. It leverages machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent data breaches, fraud and insider threats. It also reduces the attack surface for accounts and eliminates unnecessary access rights and privileges to increase data protection.
Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cybersecurity. The company was founded in 2010 by seasoned entrepreneurs with a proven track record of introducing industry-changing enterprise security solutions. Gurucul’s mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.
Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise. It is also used for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. Gurucul is headquartered in Los Angeles, CA.
- HuntersBooth: 320Hunters SOC Platform transforms security ops with AI and automation, providing a superior alternative to traditional SIEM systems. It streamlines threat detection and auto-investigation, empowering analysts with deeper insights and efficiency.
- ISACA Denver ChapterBooth: 370
The Denver Chapter of ISACA® (formerly EDPAA) was founded in June 1976 with just a handful of members. Today, the Denver chapter with over 1,040 members, is one of the largest chapters within the Southwestern Region. The Denver Chapter contributes to the international organization with financial support and periodic hosting of the International Conference.
The Denver Chapter of ISACA® is a non-profit organization dedicated to the continued development and enhancement of the information systems audit and control profession by providing benefits to its members and to the professional community-at-large.
- ISC2 Denver ChapterBooth: 400
ISC2 is the largest not-for-profit membership body of certified information security professionals worldwide, with nearly 80,000 members in more than 135 countries. Globally recognized as the Gold Standard, ISC2 issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), Certified Authorization Professional (CAP®), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates.
- ISSA Denver ChapterBooth: 390
ISSA Denver Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.
- KeysightBooth: 270
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- OktaBooth: 130
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- MySQLBooth: 240
MySQL Enterprise Edition includes the most comprehensive set of advanced features, management tools and technical support to achieve the highest levels of MySQL scalability, security, reliability, and uptime. It reduces the risk, cost, and complexity in developing, deploying, and managing business-critical MySQL applications.
- PonduranceBooth: 350
Pondurance delivers world-class Managed Detection & Response (MDR), Incident Response (IR), Vulnerability Management, and Advisory Services to industries facing today’s most pressing and dynamic cybersecurity challenges. Our U.S. based Security Operations Center (SOC) offers personal, proactive, and around-the-clock cybersecurity to protect the human experience. We take a risk-based approach to cybersecurity; so you know you are protecting your most valuable assets and reducing your cyber risk.
Our mission is to ensure that every organization is able to detect and respond to cyber threats—regardless of size, industry or current in-house capabilities. We believe AI and automation alone aren’t enough, you need ingenious human experience because attackers aren’t machines, they are people. We combine our advanced platform with decades of human intelligence to speed detection and response and contain cybersecurity threats quickly to ultimately decrease risk to your mission.
- Pure Storage, Inc.Booth: 330
Pure Storage is pioneering a new class of enterprise storage that has been designed from the ground up to take full advantage of flash memory. The company’s products accelerate random I/O-intensive applications like server virtualization, desktop virtualization (VDI), database (OLTP, rich analytics/OLAP, SQL, NoSQL), and cloudcomputing.
Pure Storage makes it cost-effective to broadly deploy flash within the data center, enabling organizations to manage growth within existing power and space constraints. Launching later this year, the company’s products are in private beta with select customers. Pure Storage is funded by Greylock Partners and Sutter Hill Ventures.
- Rapid7Booth: 310
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RubrikBooth: 150
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
- Savvy SecurityBooth: 260
Savvy automatically discovers and remediates your most toxic combinations of SaaS identity risk. It also allows you to guide users at scale towards proper security hygiene using just-in-time security guardrails.
- WiCyS Colorado AffiliateBooth: 360
- Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLC
- Jay Wilson, ModeratorCISO, Insurity
- Patrick HarrInvestor, Mentor, Volunteer, and Entrepreneur
Patrick Harr is an Investor, mentor, volunteer, entrepreneur, and frequent speaker on the dangers and misuse of AI. He has invested in multiple AI, edge, cyber and new GPU companies. He sits on the board of DEOSphere and on the advisory boards of Kobai, BlueFlag, Sales Advisors, and several new stealth companies. Patrick is also a mentor to cyber entrepreneurs from the local Silicon Valley ISSA chapter and at Santa Clara University.
Patrick started his career in cyber at Novell running security products, ran product and marketing at CacheFlow/BlueCoat, led Preventsys as CEO and most recently joined SlashNext, an email + messaging security company, as CEO to lead its growth and scale.
With four kids, Patrick spends his free time coaching basketball, attending his kid’s volleyball games around the country and volunteering for blind children and parents of children afflicted with visual impairment diseases.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Terra CookeResident Magic Girl
With 15 years in the realm of security, Terra Cooke honed a knack for forging strong partnerships and pioneering innovative security programs. Her leadership style blends strategic vision with hands-on collaboration, ensuring that our defenses evolve alongside emerging threats and regulatory landscapes. Whether deciphering complex compliance requirements or spearheading cybersecurity initiatives, she's driven by a commitment to safeguarding our assets, creating impactful strategies, and fostering a supportive, empathetic team culture. And cats.
- Karen WorstellMember, Board of Directors, Colorado Technology Association
Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.
She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, developed the first computer security manual for the Boeing Company, and led research in secure distributed computing for Boeing’s Research and Technology Division in the 1980s and 90s. From there she had senior and C-level roles in security and IT Risk Management for companies like Union Carbide, SRI Consulting, Bank of America, AT&T Wireless, Microsoft and Russell Investments. She was the CEO for AtomicTangerine, the SRI International spinoff focused on security that served international Fortune 100 companies in security strategy and major technology implementations. She co-chaired major security events for SRI International, Forbes.com, and Georgetown University Law Center.
She held positions at NIST for OSI security architecture, the security subcommittee of the Aerospace Industries Association, US Department of Commerce Security and Privacy Advisory Board, and the security subcommittee of NSTAC and has been a featured speaker at events for SecureWorld, IIA, ISSA, ISACA, AusCERT, Security Conference Israel, and RSA.
She is the author of “Governance and Internal Controls for Cutting Edge IT” published by ITG, the chapter "The Role of the CISO" in the Computer Security Handbook 5th and 6th editions (Wiley) and co-author of "Evaluating the E-Discovery Capabilities of Outside Law Firms” by Pike & Fisher.
Her technical expertise spans Identity and Access Management, Intrusion Detection and Response, and integration of security into IT and business processes for “seamless security.” She is a huge fan of "not putting steel doors on grass shacks.” Today she focuses on changing perceptions about security to reduce the growing gap between emerging technology and security and pursues her passion for matching cyber talent in leadership roles for enterprises who are serious about cyber security.
- George Kamide, ModeratorCo-Founder, Mind Over Cyber, Podcast Co-Host, Bare Knuckles & Brass Tacks
- Alex YoungDirector of IT Security, York Space Systems
- Mike EllerhorstDenver Club Host, The Cyber Breakfast Club
Mike Ellerhorst is the Founder and CEO of NTM Advisory. With over 15 years of experience in consulting and industry, he specializes in delivering transformative programs for his clients at the intersection of business and technology, with a focus in the Information Security and IT Risk domains. He holds a Bachelor's in Computer Science from the University of Notre Dame and a Global Executive MBA from Duke University's Fuqua School of Business. Mike's leadership blends advisory and practitioner perspectives, driving success in diverse clients and teams.
- Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Data Privacy & Cybersecurity, Clark Hill Law
Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
- Shawn GraffRegional Director, Region 8, DHS CISA
Serving Region 8, the Rocky Mountain Region, since 2016, Regional Director Shawn Graff leads operations across six states to bolster resiliency in both government and private sectors as they manage cyber and infrastructure security risk.
Selected as the first Director for the Region, Mr. Graff develops protocols and procedures in alignment with directives of the National Infrastructure Protection Plan, to guide a diverse team of geographically dispersed Protection, Cyber and Chemical Security Advisors and Inspectors. As the senior CISA official in the region, Mr. Graff is responsible for all aspects of the CISA mission implemented across Colorado, Montana, Utah, Wyoming and North and South Dakota.
To this work, Mr. Graff brings his dedicated experience including myriad roles focused on national safety and security. His responsibilities have ranged from directing program development at various posts in the Department of Homeland Security (DHS) to leading the City of Portland, OR in Emergency Management.
He established the first CISA regional public-private information sharing forum, uniting government and private sector representatives in identifying common issues and best practices for critical infrastructure risk management. More recently, Mr. Graff led the federal effort across Region 8 engaging Secretaries of State in improving election security; and then eased his regional team through the transition of fulfilling CISA’s mission remotely during the COVID-19 international pandemic, which included protocols for election security during the 2020 Presidential election.
Earlier in his career, Mr. Graff served as the Director of the DHS National Infrastructure Coordinating Center where he led the transformation of the Infrastructure Protection incident management plan to align response operations closer to the rest of the federal interagency and more clearly define expectations and responsibilities of response resources. Additionally, Mr. Graff served as the Assistant Deputy Director of the Homeland Security Operations Center, now known as the National Operations Center, during the standup of the Department. He also served in the intelligence community within the Office of the Director of National Intelligence working information sharing within and amongst the federal interagency.
His civil service is complemented by his active duty service, where he served as a Platoon Leader and Battalion Staff Intelligence Officer during Operation Iraqi Freedom.
Mr. Graff earned a Master of Arts Degree in International Relations from the University of Oklahoma in 2014, a Bachelor of Arts Degree in Philosophy from the University of Wisconsin in 2000, and an Associate in Fire Protection degree from Fox Valley Technical College in 1996. While earning his degrees Mr. Graff spent his summers as a federal wildland firefighter throughout the West, Southwest and Alaska, fighting fires on Hotshot, Heli-rappel, and Engine crews.
- Charlie MarmonColorado Cybersecurity Coordinator, DHS CISA
Charlie Marmon serves as the Colorado Cybersecurity State Coordinator (CSC) for the United States Cybersecurity and Infrastructure Security Agency (CISA). He supports the CISA mission of strengthening the security and resilience of the nation's critical infrastructure. His daily responsibilities include coordinating risk management and incident management activities with Colorado’s State, Local and Tribal governments.
Charlie has nearly 30 years of professional experience developing, managing, and maintaining Information Technology and Cybersecurity programs. In the past he has provided cybersecurity expertise to organizations such as Lockheed Martin, the US Army, DARPA and the NSA. He is most passionate about supporting target rich, cyber poor local governments in rural Colorado.
- Debra BrownVice President, Savvy
Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate learner, book lover, and a devoted mother and wife in a loving, blended family.
- Michael MarxMySQL Master Principal Solution Engineer, Oracle
Michael Marx, one of Oracle MySQL’s talented solutions engineers with a flair for transforming complex database challenges into seamless solutions.
When Michael isn’t decoding the mysteries of MySQL, he’s probably perfecting his latest recipe for the ultimate data-driven cocktail or plotting his next tech adventure. With a knack for making intricate tech talk feel like a casual chat over coffee, Michael brings a blend of expertise and enthusiasm to every stage he graces. His passion for MySQL is only matched by his love for sharing knowledge and making technology accessible and fun. When he’s not engineering solutions, Michael enjoys managing his vineyard and crafting exquisite wines.
Join him for a lively and insightful session where technology meets creativity, and you might even get a taste of his passion for both databases and wine!
- Dennis MastinSolutions Architect, CyberArk
Dennis Mastin, CISSP, is a security professional focused on securing the identities of humans and automated workloads. He has been in industry for over 30 years as a software engineer, field sales specialist, and consultant. The past two decades, Dennis focused on Identity and Access Management while at Netscape, Sun Microsystems, and Oracle. Currently, Dennis helps CyberArk customers realize the benefits of securing identities across a wide range of industries.
- Ed ReynoldsDigital Security Consultant, Americas DPS, Entrust
Ed has over 20 years’ experience in cybersecurity, covering SSL/VPN, Intel chip security technologies, endpoint protection, DLP, data at rest/in motion encryption technologies, key management, and managed security services. Based in Austin, Texas, Ed is a member of the Entrust Digital Security Solutions Center of Excellence for Data Protection Solutions. Prior to Entrust, Ed served in strategic alliance roles at Thales DIS and Symantec, where he worked with Global System Integrators. Earlier, he held leadership roles software products at Dell, semiconductors at Britestream Networks, and networking products at Compaq and Motorola.
- Rick VincentDirector of System Engineering, Rockies Enterprise Team, Fortinet
Rick Vincent is the Director of System Engineering for the Rockies Enterprise team at Fortinet. His career has included roles in product development and engineering for security, networking, storage, and cloud disciplines. He is an avid outdoorsman and father who loves all the activities the Rocky Mountains have to offer. With Rick, look forward to some interesting stories across key industries and some inspiring strategies for success in your cybersecurity journey.
- Richard Staynings, ModeratorBoard Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of Denver
Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.
Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.
A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA
Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.
- Shawn E. TumaCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Chris Scheels, ModeratorVice President, Gurucul
Chris has been aligning people, processes and technology to drive companies forward for over 20 years. He has a decade of cybersecurity experience in product marketing and product management. His passion is helping businesses succeed through the strategic use of technology. Most recently he was helping customers accelerate their Zero Trust journey at Appgate, Inc. His background also includes experience in operations, sales, and new business development.
- Karen WorstellMember, Board of Directors, Colorado Technology Association
Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.
She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, developed the first computer security manual for the Boeing Company, and led research in secure distributed computing for Boeing’s Research and Technology Division in the 1980s and 90s. From there she had senior and C-level roles in security and IT Risk Management for companies like Union Carbide, SRI Consulting, Bank of America, AT&T Wireless, Microsoft and Russell Investments. She was the CEO for AtomicTangerine, the SRI International spinoff focused on security that served international Fortune 100 companies in security strategy and major technology implementations. She co-chaired major security events for SRI International, Forbes.com, and Georgetown University Law Center.
She held positions at NIST for OSI security architecture, the security subcommittee of the Aerospace Industries Association, US Department of Commerce Security and Privacy Advisory Board, and the security subcommittee of NSTAC and has been a featured speaker at events for SecureWorld, IIA, ISSA, ISACA, AusCERT, Security Conference Israel, and RSA.
She is the author of “Governance and Internal Controls for Cutting Edge IT” published by ITG, the chapter "The Role of the CISO" in the Computer Security Handbook 5th and 6th editions (Wiley) and co-author of "Evaluating the E-Discovery Capabilities of Outside Law Firms” by Pike & Fisher.
Her technical expertise spans Identity and Access Management, Intrusion Detection and Response, and integration of security into IT and business processes for “seamless security.” She is a huge fan of "not putting steel doors on grass shacks.” Today she focuses on changing perceptions about security to reduce the growing gap between emerging technology and security and pursues her passion for matching cyber talent in leadership roles for enterprises who are serious about cyber security.
- Rhett SaundersExecutive Director of Cybersecurity & Infrastructure, Focus on the Family
Rhett served the Federal Reserve, and while there, led regular Enterprise Risk Management discussions between the Federal Reserve and U.S. Treasury with a focus on cybersecurity. He is a former NSA cryptoanalyst and a U.S. Army veteran, having served multiple joint intelligence communities, both foreign and domestic government agencies in international locations.
Rhett is a public speaker on the topic of privacy and identity theft prevention. He lectures on cybersecurity and cryptography topics at University of Colorado Colorado Springs (UCCS) and Flatiron School. He also serves on the SecureWorld Advisory Council. Rhett earned a Master of Business Administration from LeTourneau University and holds the CISSP credential.
- Teressa GehrkeFounder, PopCykol
Teressa Gehrke is the Founder of PopCykol, a trusted online safety resource for families and kids. PopCykol stands for Protecting Our Precious Curious Kids Online. PopCykol teaches internet safety concepts in a fun, easy, and interactive style.
She has worked in cybersecurity since 2014 as a technical writer, user experience designer, and project manager for various industries including biotech, healthcare, government, telecom, space, and banking. She has also taught cybersecurity at local colleges. Teressa graduated from the University of Denver with a B.A. in Art History and Anthropology. She earned a Master’s in Genetic Anthropology and International Development from Colorado State University and advanced her education studying Network Security at Arapahoe Community College. She is the Social Media Chair of Women in Cybersecurity - Colorado affiliate, President of Business & Professional Women of Colorado - Denver chapter, and Digital Training Chair for the National Federation of Business & Professional Women's Clubs.
Teressa is an award-winning children’s music singer-songwriter and brings her artistry to PopCykol. In 2022, she was nominated for Cybersecurity Woman of the Year by the United Cybersecurity Alliance. In 2023, she was a keynote speaker at the United Nations Commission on the Status of Women. In her free time, she enjoys standup paddleboarding, painting, singing, songwriting, and drumming.
- Danny ManimboPrincipal | ISO Practice Director | AI Assessment Leader, Schellman
Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)
- Kent BlackwellDirector, Penetration Testing Team, Schellman
Kent Blackwell is a Director at Schellman, helping lead their penetration testing and offensive security practice. Kent has over fifteen years of experience serving clients in a multitude of industries, including the Department of Defense and top cloud service providers. He got his start in penetration testing evaluating systems as a civilian with the Air Force before later joining Schellman to help build the security practice. A security and privacy enthusiast, Kent is passionate about ensuring people can have confidence in the platforms to which they entrust their data.
- Sanjana MahadeshwarTechnical Security Engineer, Yahoo
A dedicated Security Engineer with a passion for safeguarding Yahoo resources against cyber threats. With more than three years of experience in the realm of cybersecurity, I have honed my skills in securing applications, identifying vulnerabilities, and implementing robust solutions. With a Master's degree in Cybersecurity, my expertise extends beyond traditional security paradigms; I am well-versed in emerging technologies and industry best practices. My academic background, coupled with hands-on experience, enables me to navigate the ever-evolving landscape of Security Programs.
- Patrick "Suess" BeyerNetwork Intrusion Forensic Analyst, U.S. Secret Service
- Happy Hour
- George Al-KouraCISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
- George KamideCo-Founder, Mind Over Cyber, Podcast Co-Host,, Bare Knuckles & Brass Tacks
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes