googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 9, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Delaplaine

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, October 10, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Breakfast Roundtable (VIP / Invite Only)
    • session level icon
    Lessons from Recent Vendor Incidents and Strategies for Resilience
    speaker photo
    CISO, Insurity
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Saeman

    This session is for SecureWorld Advisory Council members only.

    Recent incidents involving major cybersecurity vendors like CrowdStrike and Microsoft have highlighted the critical issue of single-point failures in our digital defense ecosystems. Let’s discuss the aftermath of these events and explore the broader implications for organizational cybersecurity strategies, including:

    • The dangers of over-reliance on single vendors: Explore the risks of putting all your security eggs in one basket.
    • Developing a multi-vendor strategy: Balancing the benefits of integrated solutions with the need for redundancy and resilience.
    • Incident response planning: Preparing for vendor-related outages or failures as part of your cybersecurity strategy.
    • Future outlook: How the industry might evolve to address these challenges.

    Gain valuable insights into creating more resilient security architectures that can withstand vendor-specific incidents.

    8:00 am
    ISSA Chapter Meeting [Open to all attendees]
    • session level icon
    A Look at Pig Butchering: A Crypto Contributor to $4.5B of Investment Scam Losses Annually
    speaker photo
    Investor, Mentor, Volunteer, and Entrepreneur
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Barbara Bresnan Boardroom

    Patrick will focus on the dangers of phishing, BEC, and social engineering and its impact on business and personal lives. He will discuss personal experiences about family members who were pig butchered and hit with identify fraud. And he will close with a discussion of the dangers and weaponization of AI in cybercrime and the defense-in-depth measures that organizations can take to protect employees with the latest AI email and communications security.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of Conflict
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    This informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.

    Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.

    He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    speaker photo
    CSO, Traceable AI
    speaker photo
    Resident Magic Girl
    speaker photo
    Member, Board of Directors, Colorado Technology Association
    speaker photo
    Co-Founder, Mind Over Cyber, Podcast Co-Host, Bare Knuckles & Brass Tacks
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Barbara Bresnan Boardroom
    This panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
    10:15 am
    What's More Complex, the Internet or the Galaxy?
    • session level icon
    The Intersection of Cybersecurity and Space
    speaker photo
    Director of IT Security, York Space Systems
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Delaplaine

    Session description coming soon.

    10:15 am
    Cybersecurity and Resilience: It's Not Just Bob's Job Anymore
    • session level icon
    speaker photo
    Director Technical Strategy, Cyber Resiliency, Pure Storage
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: ACA/Triax Room

    In today’s rapidly evolving digital landscape, cybersecurity is no longer solely the responsibility of backup administrators. It demands a collective effort and a streamlined approach to ensure comprehensive protection across an organization. This presentation delves into the critical themes of modern data protection: broadening responsibility beyond backup administrators, tightening security cycles, and maintaining simplicity in implementation.

    We will explore the significance of a tiered data protection architecture—a modern methodology that safeguards data across multiple geographies while ensuring high accessibility. This approach is essential for organizations seeking robust and resilient data protection strategies.

    Pure Storage offers innovative solutions that empower customers to consolidate modern data applications onto a single, scalable platform. By eliminating complex and inefficient infrastructure silos, our solutions provide unparalleled investment protection and operational efficiency. Join us to discover how Pure Storage can help your organization achieve new heights in data security and management.

     

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Privacy for Security Professionals: Protecting Data in a Time of Uncertainty
    • session level icon
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Delaplaine

    It feels like every day a new privacy law is enacted by the states, new regulations are issued by federal regulators, and then those regulations are overturned by the courts once challenged. This session explores how businesses can roll out sound data privacy practices in a time of so much legal uncertainty.

    11:10 am
    Securing Our World: CISA, Cybersecurity, and You
    • session level icon
    speaker photo
    Regional Director, Region 8, DHS CISA
    speaker photo
    Colorado Cybersecurity Coordinator, DHS CISA
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: ACA/Triax Room

    Session description to come.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Vice President, Savvy
    speaker photo
    MySQL Master Principal Solution Engineer, Oracle
    speaker photo
    Solutions Architect, CyberArk
    speaker photo
    Digital Security Consultant, Americas DPS, Entrust
    speaker photo
    Director of System Engineering, Rockies Enterprise Team, Fortinet
    speaker photo
    Board Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of Denver
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Barbara Bresnan Boardroom

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] Building Cyber Resilience Through Leadership and the Power of Perspective
    • session level icon
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session description coming soon.

    12:00 pm
    Advisory Council Lunch Roundtable (VIP / Invite Only)
    • session level icon
    How to Secure Your Organization from Internal and External Identity-Based Threats
    speaker photo
    Vice President, Gurucul
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Saeman

    Do you know if a threat is an Insider Risk or a Compromised Identity? Securing your organization from identity-based threats is paramount to reducing cyber risk. Security operations teams need the tools to help them quickly determine if they are dealing with a true insider threat or a compromised account. It’s important to link identity, access and activity to achieve clarity about gaps and risks that insider or external threat actors can exploit. In this closed-door, peer-to-peer discussion, we will discuss ways to combat these threats, reduce the attack surface, manage risk, and protect your enterprise.

    Advisory Council roundtable discussion moderated by:

     

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    A Risk Management Strategy for AI that Won't Drive You Bananas
    • session level icon
    speaker photo
    Member, Board of Directors, Colorado Technology Association
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Delaplaine

    AI is the fourth event horizon of our technology lifetime !  Karen will provide an AI backgrounder and share the risk management strategy that will ensure you aren’t caught in the compliance hamster wheel of pain as legislators and regulators respond to the explosive AI revolution.

    1:15 pm
    Building a Robust Privacy Framework: Mastering ‘Forget Me’ and Subject Access Requests
    • session level icon
    speaker photo
    Executive Director of Cybersecurity & Infrastructure, Focus on the Family
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: ACA/Triax Room

    In today’s data-driven world, organizations face increasing pressure to protect personal information while complying with complex privacy regulations. This session offers practical insights and strategies for developing a comprehensive privacy program that effectively manages ‘Forget Me’ requests and Subject Access Requests (SARs). Drawing from real-world experiences, we’ll explore how to leverage people, processes, and technology to create a privacy framework that meets regulatory requirements and builds trust with customers and stakeholders.

    Key Takeaways:

    1. Roadmap to Success: Learn how to develop a strategic project roadmap for implementing a robust privacy program, including key milestones and dependencies.
    2. Streamlined SAR Management: Discover efficient processes for handling Subject Access Requests, from initial receipt to final delivery of information.
    3. Effective ‘Forget Me’ Protocols: Explore best practices for implementing and managing data erasure requests in compliance with GDPR and other privacy regulations.
    4. Data Discovery and Classification: Understand techniques for conducting thorough data inventories and classification to support privacy initiatives.
    5. Technology Integration: Learn how to leverage technology solutions to automate and enhance privacy processes, including data mapping and request management.
    6. Training and Culture: Develop strategies for fostering a privacy-aware culture through comprehensive employee training and engagement.
    7. Balancing Compliance and Operations: Gain insights on striking the right balance between regulatory compliance and operational efficiency.
    8. Continuous Improvement: Explore methods for monitoring, auditing, and continuously improving your privacy program to adapt to evolving regulations and threats.

    This session will equip privacy professionals, IT leaders, and compliance officers with actionable strategies to enhance their organization’s privacy posture and effectively manage data subject rights in an increasingly complex regulatory landscape.

    1:15 pm
    Getting Rid of the Gobbledygook in Cybersecurity
    • session level icon
    speaker photo
    Founder, PopCykol
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Barbara Bresnan Boardroom

    Cybersecurity can often feel like an exclusive club, shrouded in complex terms and technical jargon. This interactive discussion will focus on reframing and reimagining how we communicate about cybersecurity to make it more accessible, especially for non-native speakers and those new to the field. We will break down common industry terminology into simple, digestible pieces, to better understand essential concepts. By demystifying the language of cybersecurity, we aim to empower more people to engage with online safety, fostering a more inclusive environment where everyone can become fluent in the basics needed to stay safe online and contribute to securing our world.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    How to Build Trustworthy and Secure AI Systems: Key Frameworks & Vulnerabilities You Need to Know
    • session level icon
    speaker photo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman
    speaker photo
    Director, Penetration Testing Team, Schellman
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Delaplaine

    The advancements of artificial intelligence (AI) have taken both popular culture and almost every industry by storm, due to the technology’s far-reaching abilities to augment human skills and bring safety and efficiency to several areas of our everyday lives. But these systems also bring with them a wealth of challenges, from ethics to security. We must be just as concerned about an organizations’ use of AI in critical workflows as we should be about LLMs disclosing sensitive data. How we evaluate these systems security, resilience, and robustness will be driven by well-established bedrock principles in both audit and assessments.

    2:10 pm
    Embracing ‘Yes’: Empowering New Cybersecurity Engineers to Thrive
    • session level icon
    speaker photo
    Technical Security Engineer, Yahoo
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: ACA/Triax Room
    Are you a leader dealing with an increasing number of new engineers starting their first cybersecurity roles? You’re not alone! Many new cybersecurity engineers face imposter syndrome and are hesitant to be open with their leaders, which slows down their growth and work output.
    We have always heard saying ‘yes’ can open unexpected doors and lead to diverse opportunities. This has been true for me. Come join me as I share my journey from graduation to navigating the challenges of entering the industry, emphasizing the transformative power of embracing the “yes” attitude that helped me overcome new challenges and experiences.
    I’ll discuss how I conquered imposter syndrome, improved my skills through real-world scenarios, and connected with people who could help enhance my skill set—all by embracing one simple word—YES!
    Furthermore, I’ll share how leaders can support their new hires by promoting the “Yes” mentality and its benefits. This helps them embrace new opportunities, leverage diverse experiences, and evolve with each challenge.
    Let’s collaborate to create a thriving community of confident and capable cybersecurity professionals.
    2:10 pm
    Recent Cybercrime Trends by the U.S. Secret Service
    • session level icon
    speaker photo
    Network Intrusion Forensic Analyst, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Barbara Bresnan Boardroom

    We’ll discuss trends in e-fraud, cybercrime , and the evolution of recent attacks in the Rocky Mountain region.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    3:30 pm
    [Closing Keynote] Radical Transparency Needed to Build Trust
    • session level icon
    speaker photo
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
    speaker photo
    Co-Founder, Mind Over Cyber, Podcast Co-Host,, Bare Knuckles & Brass Tacks
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    Session description coming soon.

Exhibitors
  • Anvilogic
    Booth: 230

    Anvilogic is a cloud-based modern Security Operations Platform for threat detection, investigation, and incident response (TDIR) to optimize and unify the detection, hunting, and triage lifecycle to more efficiently and effectively respond to threats across hybrid and multi-cloud workloads and security data lakes.

  • baramundi software USA, Inc.
    Booth: 140

    baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

    The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs.

    Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution.

  • Colorado Technology Association
    Booth: 390

    The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.

    At the Colorado Technology Association, we:

    – Lead an inclusive network that benefits our member community
    – Advocate for a pro-business and technology-friendly climate
    – Influence the development of a robust talent pipeline
    – Lead initiatives to help companies grow.

  • CyberArk Software
    Booth: 340

    CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

  • Cyberhaven
    Booth: 300

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Entrust
    Booth: 220

    Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

  • Fortinet
    Booth: 210

    Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.

  • Gurucul
    Booth: 250

    Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Cloud-native Next-Gen Security Analytics and Operations Platform provides customers with Next Generation SIEM, UEBA, Open XDR, and Identity & Access Analytics. It leverages machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent data breaches, fraud and insider threats. It also reduces the attack surface for accounts and eliminates unnecessary access rights and privileges to increase data protection.

    Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cybersecurity. The company was founded in 2010 by seasoned entrepreneurs with a proven track record of introducing industry-changing enterprise security solutions. Gurucul’s mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

    Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise. It is also used for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. Gurucul is headquartered in Los Angeles, CA.

  • Hunters
    Booth: 320
    Hunters SOC Platform transforms security ops with AI and automation, providing a superior alternative to traditional SIEM systems. It streamlines threat detection and auto-investigation, empowering analysts with deeper insights and efficiency.

     

  • ISACA Denver Chapter
    Booth: 370

    The Denver Chapter of ISACA® (formerly EDPAA) was founded in June 1976 with just a handful of members. Today, the Denver chapter with over 1,040 members, is one of the largest chapters within the Southwestern Region. The Denver Chapter contributes to the international organization with financial support and periodic hosting of the International Conference.

    The Denver Chapter of ISACA® is a non-profit organization dedicated to the continued development and enhancement of the information systems audit and control profession by providing benefits to its members and to the professional community-at-large.

  • ISC2 Denver Chapter
    Booth: 400

    ISC2 is the largest not-for-profit membership body of certified information security professionals worldwide, with nearly 80,000 members in more than 135 countries. Globally recognized as the Gold Standard, ISC2 issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), Certified Authorization Professional (CAP®), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates.

  • ISSA Denver Chapter
    Booth: 390

    ISSA Denver Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Keysight
    Booth: 270

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Okta
    Booth: 130

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • MySQL
    Booth: 240

    MySQL Enterprise Edition includes the most comprehensive set of advanced features, management tools and technical support to achieve the highest levels of MySQL scalability, security, reliability, and uptime. It reduces the risk, cost, and complexity in developing, deploying, and managing business-critical MySQL applications.

  • Pondurance
    Booth: 350

    Pondurance delivers world-class Managed Detection & Response (MDR), Incident Response (IR), Vulnerability Management, and Advisory Services to industries facing today’s most pressing and dynamic cybersecurity challenges. Our U.S. based Security Operations Center (SOC) offers personal, proactive, and around-the-clock cybersecurity to protect the human experience. We take a risk-based approach to cybersecurity; so you know you are protecting your most valuable assets and reducing your cyber risk.

    Our mission is to ensure that every organization is able to detect and respond to cyber threats—regardless of size, industry or current in-house capabilities. We believe AI and automation alone aren’t enough, you need ingenious human experience because attackers aren’t machines, they are people. We combine our advanced platform with decades of human intelligence to speed detection and response and contain cybersecurity threats quickly to ultimately decrease risk to your mission.

  • Pure Storage, Inc.
    Booth: 330

    Pure Storage is pioneering a new class of enterprise storage that has been designed from the ground up to take full advantage of flash memory. The company’s products accelerate random I/O-intensive applications like server virtualization, desktop virtualization (VDI), database (OLTP, rich analytics/OLAP, SQL, NoSQL), and cloudcomputing.

    Pure Storage makes it cost-effective to broadly deploy flash within the data center, enabling organizations to manage growth within existing power and space constraints. Launching later this year, the company’s products are in private beta with select customers. Pure Storage is funded by Greylock Partners and Sutter Hill Ventures.

  • Rapid7
    Booth: 310

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Rubrik
    Booth: 150

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • Savvy Security
    Booth: 260

    Savvy automatically discovers and remediates your most toxic combinations of SaaS identity risk. It also allows you to guide users at scale towards proper security hygiene using just-in-time security guardrails.

  • WiCyS Colorado Affiliate
    Booth: 360
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Jay Wilson, Moderator
    CISO, Insurity
  • speaker photo
    Patrick Harr
    Investor, Mentor, Volunteer, and Entrepreneur

    Patrick Harr is an Investor, mentor, volunteer, entrepreneur, and frequent speaker on the dangers and misuse of AI. He has invested in multiple AI, edge, cyber and new GPU companies. He sits on the board of DEOSphere and on the advisory boards of Kobai, BlueFlag, Sales Advisors, and several new stealth companies. Patrick is also a mentor to cyber entrepreneurs from the local Silicon Valley ISSA chapter and at Santa Clara University.

    Patrick started his career in cyber at Novell running security products, ran product and marketing at CacheFlow/BlueCoat, led Preventsys as CEO and most recently joined SlashNext, an email + messaging security company, as CEO to lead its growth and scale.

    With four kids, Patrick spends his free time coaching basketball, attending his kid’s volleyball games around the country and volunteering for blind children and parents of children afflicted with visual impairment diseases.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Richard Bird
    CSO, Traceable AI
  • speaker photo
    Terra Cooke
    Resident Magic Girl

    With 15 years in the realm of security, Terra Cooke honed a knack for forging strong partnerships and pioneering innovative security programs. Her leadership style blends strategic vision with hands-on collaboration, ensuring that our defenses evolve alongside emerging threats and regulatory landscapes. Whether deciphering complex compliance requirements or spearheading cybersecurity initiatives, she's driven by a commitment to safeguarding our assets, creating impactful strategies, and fostering a supportive, empathetic team culture. And cats.

  • speaker photo
    Karen Worstell
    Member, Board of Directors, Colorado Technology Association

    Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.

    She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, developed the first computer security manual for the Boeing Company, and led research in secure distributed computing for Boeing’s Research and Technology Division in the 1980s and 90s. From there she had senior and C-level roles in security and IT Risk Management for companies like Union Carbide, SRI Consulting, Bank of America, AT&T Wireless, Microsoft and Russell Investments. She was the CEO for AtomicTangerine, the SRI International spinoff focused on security that served international Fortune 100 companies in security strategy and major technology implementations. She co-chaired major security events for SRI International, Forbes.com, and Georgetown University Law Center.

    She held positions at NIST for OSI security architecture, the security subcommittee of the Aerospace Industries Association, US Department of Commerce Security and Privacy Advisory Board, and the security subcommittee of NSTAC and has been a featured speaker at events for SecureWorld, IIA, ISSA, ISACA, AusCERT, Security Conference Israel, and RSA.

    She is the author of “Governance and Internal Controls for Cutting Edge IT” published by ITG, the chapter "The Role of the CISO" in the Computer Security Handbook 5th and 6th editions (Wiley) and co-author of "Evaluating the E-Discovery Capabilities of Outside Law Firms” by Pike & Fisher.

    Her technical expertise spans Identity and Access Management, Intrusion Detection and Response, and integration of security into IT and business processes for “seamless security.” She is a huge fan of "not putting steel doors on grass shacks.” Today she focuses on changing perceptions about security to reduce the growing gap between emerging technology and security and pursues her passion for matching cyber talent in leadership roles for enterprises who are serious about cyber security.

  • speaker photo
    George Kamide, Moderator
    Co-Founder, Mind Over Cyber, Podcast Co-Host, Bare Knuckles & Brass Tacks
  • speaker photo
    Alex Young
    Director of IT Security, York Space Systems
  • speaker photo
    Jason Walker
    Director Technical Strategy, Cyber Resiliency, Pure Storage

    Jason has been with Pure Storage since 2019, bringing Pure Storage’s Cyber Resiliency message to the market.

    At Pure Storage, Jason is the face, voice, and conscience of the practice and has consulted with thousands of customers on the best approach for their desired outcomes.

    Jason has 25+ years of experience in this space and has worked with many data protection, storage, and security solutions. He has appeared on hundreds of webinars, meetings, and events as an expert in the field.

    A graduate of the University of Florida, Jason currently resides in Daytona Beach Shores, FL.

  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    Shawn Graff
    Regional Director, Region 8, DHS CISA

    Serving Region 8, the Rocky Mountain Region, since 2016, Regional Director Shawn Graff leads operations across six states to bolster resiliency in both government and private sectors as they manage cyber and infrastructure security risk.

    Selected as the first Director for the Region, Mr. Graff develops protocols and procedures in alignment with directives of the National Infrastructure Protection Plan, to guide a diverse team of geographically dispersed Protection, Cyber and Chemical Security Advisors and Inspectors. As the senior CISA official in the region, Mr. Graff is responsible for all aspects of the CISA mission implemented across Colorado, Montana, Utah, Wyoming and North and South Dakota.

    To this work, Mr. Graff brings his dedicated experience including myriad roles focused on national safety and security. His responsibilities have ranged from directing program development at various posts in the Department of Homeland Security (DHS) to leading the City of Portland, OR in Emergency Management.

    He established the first CISA regional public-private information sharing forum, uniting government and private sector representatives in identifying common issues and best practices for critical infrastructure risk management. More recently, Mr. Graff led the federal effort across Region 8 engaging Secretaries of State in improving election security; and then eased his regional team through the transition of fulfilling CISA’s mission remotely during the COVID-19 international pandemic, which included protocols for election security during the 2020 Presidential election.

    Earlier in his career, Mr. Graff served as the Director of the DHS National Infrastructure Coordinating Center where he led the transformation of the Infrastructure Protection incident management plan to align response operations closer to the rest of the federal interagency and more clearly define expectations and responsibilities of response resources. Additionally, Mr. Graff served as the Assistant Deputy Director of the Homeland Security Operations Center, now known as the National Operations Center, during the standup of the Department. He also served in the intelligence community within the Office of the Director of National Intelligence working information sharing within and amongst the federal interagency.

    His civil service is complemented by his active duty service, where he served as a Platoon Leader and Battalion Staff Intelligence Officer during Operation Iraqi Freedom.

    Mr. Graff earned a Master of Arts Degree in International Relations from the University of Oklahoma in 2014, a Bachelor of Arts Degree in Philosophy from the University of Wisconsin in 2000, and an Associate in Fire Protection degree from Fox Valley Technical College in 1996. While earning his degrees Mr. Graff spent his summers as a federal wildland firefighter throughout the West, Southwest and Alaska, fighting fires on Hotshot, Heli-rappel, and Engine crews.

  • speaker photo
    Charlie Marmon
    Colorado Cybersecurity Coordinator, DHS CISA

    Charlie Marmon serves as the Colorado Cybersecurity State Coordinator (CSC) for the United States Cybersecurity and Infrastructure Security Agency (CISA). He supports the CISA mission of strengthening the security and resilience of the nation's critical infrastructure. His daily responsibilities include coordinating risk management and incident management activities with Colorado’s State, Local and Tribal governments.

    Charlie has nearly 30 years of professional experience developing, managing, and maintaining Information Technology and Cybersecurity programs. In the past he has provided cybersecurity expertise to organizations such as Lockheed Martin, the US Army, DARPA and the NSA. He is most passionate about supporting target rich, cyber poor local governments in rural Colorado.

  • speaker photo
    Debra Brown
    Vice President, Savvy

    Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate learner, book lover, and a devoted mother and wife in a loving, blended family.

  • speaker photo
    Michael Marx
    MySQL Master Principal Solution Engineer, Oracle

    Michael Marx, one of Oracle MySQL’s talented solutions engineers with a flair for transforming complex database challenges into seamless solutions.

    When Michael isn’t decoding the mysteries of MySQL, he’s probably perfecting his latest recipe for the ultimate data-driven cocktail or plotting his next tech adventure. With a knack for making intricate tech talk feel like a casual chat over coffee, Michael brings a blend of expertise and enthusiasm to every stage he graces. His passion for MySQL is only matched by his love for sharing knowledge and making technology accessible and fun. When he’s not engineering solutions, Michael enjoys managing his vineyard and crafting exquisite wines.

    Join him for a lively and insightful session where technology meets creativity, and you might even get a taste of his passion for both databases and wine!

  • speaker photo
    Dennis Mastin
    Solutions Architect, CyberArk

    Dennis Mastin, CISSP, is a security professional focused on securing the identities of humans and automated workloads. He has been in industry for over 30 years as a software engineer, field sales specialist, and consultant. The past two decades, Dennis focused on Identity and Access Management while at Netscape, Sun Microsystems, and Oracle. Currently, Dennis helps CyberArk customers realize the benefits of securing identities across a wide range of industries.

  • speaker photo
    Ed Reynolds
    Digital Security Consultant, Americas DPS, Entrust

    Ed has over 20 years’ experience in cybersecurity, covering SSL/VPN, Intel chip security technologies, endpoint protection, DLP, data at rest/in motion encryption technologies, key management, and managed security services. Based in Austin, Texas, Ed is a member of the Entrust Digital Security Solutions Center of Excellence for Data Protection Solutions. Prior to Entrust, Ed served in strategic alliance roles at Thales DIS and Symantec, where he worked with Global System Integrators. Earlier, he held leadership roles software products at Dell, semiconductors at Britestream Networks, and networking products at Compaq and Motorola.

  • speaker photo
    Rick Vincent
    Director of System Engineering, Rockies Enterprise Team, Fortinet

    Rick Vincent is the Director of System Engineering for the Rockies Enterprise team at Fortinet. His career has included roles in product development and engineering for security, networking, storage, and cloud disciplines. He is an avid outdoorsman and father who loves all the activities the Rocky Mountains have to offer. With Rick, look forward to some interesting stories across key industries and some inspiring strategies for success in your cybersecurity journey.

  • speaker photo
    Richard Staynings, Moderator
    Board Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of Denver

    Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.

    Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.

    A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA

    Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Chris Scheels, Moderator
    Vice President, Gurucul

    Chris has been aligning people, processes and technology to drive companies forward for over 20 years. He has a decade of cybersecurity experience in product marketing and product management. His passion is helping businesses succeed through the strategic use of technology. Most recently he was helping customers accelerate their Zero Trust journey at Appgate, Inc. His background also includes experience in operations, sales, and new business development.

  • speaker photo
    Karen Worstell
    Member, Board of Directors, Colorado Technology Association

    Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.

    She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, developed the first computer security manual for the Boeing Company, and led research in secure distributed computing for Boeing’s Research and Technology Division in the 1980s and 90s. From there she had senior and C-level roles in security and IT Risk Management for companies like Union Carbide, SRI Consulting, Bank of America, AT&T Wireless, Microsoft and Russell Investments. She was the CEO for AtomicTangerine, the SRI International spinoff focused on security that served international Fortune 100 companies in security strategy and major technology implementations. She co-chaired major security events for SRI International, Forbes.com, and Georgetown University Law Center.

    She held positions at NIST for OSI security architecture, the security subcommittee of the Aerospace Industries Association, US Department of Commerce Security and Privacy Advisory Board, and the security subcommittee of NSTAC and has been a featured speaker at events for SecureWorld, IIA, ISSA, ISACA, AusCERT, Security Conference Israel, and RSA.

    She is the author of “Governance and Internal Controls for Cutting Edge IT” published by ITG, the chapter "The Role of the CISO" in the Computer Security Handbook 5th and 6th editions (Wiley) and co-author of "Evaluating the E-Discovery Capabilities of Outside Law Firms” by Pike & Fisher.

    Her technical expertise spans Identity and Access Management, Intrusion Detection and Response, and integration of security into IT and business processes for “seamless security.” She is a huge fan of "not putting steel doors on grass shacks.” Today she focuses on changing perceptions about security to reduce the growing gap between emerging technology and security and pursues her passion for matching cyber talent in leadership roles for enterprises who are serious about cyber security.

  • speaker photo
    Rhett Saunders
    Executive Director of Cybersecurity & Infrastructure, Focus on the Family

    Rhett served the Federal Reserve, and while there, led regular Enterprise Risk Management discussions between the Federal Reserve and U.S. Treasury with a focus on cybersecurity. He is a former NSA cryptoanalyst and a U.S. Army veteran, having served multiple joint intelligence communities, both foreign and domestic government agencies in international locations.

    Rhett is a public speaker on the topic of privacy and identity theft prevention. He lectures on cybersecurity and cryptography topics at University of Colorado Colorado Springs (UCCS) and Flatiron School. He also serves on the SecureWorld Advisory Council. Rhett earned a Master of Business Administration from LeTourneau University and holds the CISSP credential.

  • speaker photo
    Teressa Gehrke
    Founder, PopCykol

    Teressa Gehrke is the Founder of PopCykol, a trusted online safety resource for families and kids. PopCykol stands for Protecting Our Precious Curious Kids Online. PopCykol teaches internet safety concepts in a fun, easy, and interactive style.

    She has worked in cybersecurity since 2014 as a technical writer, user experience designer, and project manager for various industries including biotech, healthcare, government, telecom, space, and banking. She has also taught cybersecurity at local colleges. Teressa graduated from the University of Denver with a B.A. in Art History and Anthropology. She earned a Master’s in Genetic Anthropology and International Development from Colorado State University and advanced her education studying Network Security at Arapahoe Community College. She is the Social Media Chair of Women in Cybersecurity - Colorado affiliate, President of Business & Professional Women of Colorado - Denver chapter, and Digital Training Chair for the National Federation of Business & Professional Women's Clubs.

    Teressa is an award-winning children’s music singer-songwriter and brings her artistry to PopCykol. In 2022, she was nominated for Cybersecurity Woman of the Year by the United Cybersecurity Alliance. In 2023, she was a keynote speaker at the United Nations Commission on the Status of Women. In her free time, she enjoys standup paddleboarding, painting, singing, songwriting, and drumming.

  • speaker photo
    Danny Manimbo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman

    Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)

  • speaker photo
    Kent Blackwell
    Director, Penetration Testing Team, Schellman

    Kent Blackwell is a Director at Schellman, helping lead their penetration testing and offensive security practice. Kent has over fifteen years of experience serving clients in a multitude of industries, including the Department of Defense and top cloud service providers. He got his start in penetration testing evaluating systems as a civilian with the Air Force before later joining Schellman to help build the security practice. A security and privacy enthusiast, Kent is passionate about ensuring people can have confidence in the platforms to which they entrust their data.

  • speaker photo
    Sanjana Mahadeshwar
    Technical Security Engineer, Yahoo

    A dedicated Security Engineer with a passion for safeguarding Yahoo resources against cyber threats. With more than three years of experience in the realm of cybersecurity, I have honed my skills in securing applications, identifying vulnerabilities, and implementing robust solutions. With a Master's degree in Cybersecurity, my expertise extends beyond traditional security paradigms; I am well-versed in emerging technologies and industry best practices. My academic background, coupled with hands-on experience, enables me to navigate the ever-evolving landscape of Security Programs.

  • speaker photo
    Patrick "Suess" Beyer
    Network Intrusion Forensic Analyst, U.S. Secret Service
  • speaker photo
    Happy Hour
  • speaker photo
    George Al-Koura
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    George Kamide
    Co-Founder, Mind Over Cyber, Podcast Co-Host,, Bare Knuckles & Brass Tacks
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Best practices & solutions, straight from the source

Join your local cybersecurity community for learning and professional growth!