Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, September 10, 20259:00 am[PLUS Course] Leveraging Identity & Zero Trust to Protect and Enable the BusinessManaging Director, Profortis Solutions LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: MoonstoneThis live workshop is your steppingstone to gaining a strong understanding of two strategic cybersecurity technologies. In just 6 hours, you will :- Study Identity & Access Management (IAM) & Zero Trust (ZT) – Comprehend the components of IAM & ZT and how they fit into the enterprise security architecture
- Understand the business value of IAM & ZT – Gain practical enterprise insights into how these key technologies can drive security transformation
- Gain a step by step by roadmap for adoption – Understand how to deploy these key technologies along with real word examples
- Foster digital trust – Speak with self-assurance with business, IT & cyber leadership and serve as a trusted adviser to build out a strategic roadmap
What makes this different?
You will gain deep knowledge and rich insights from an eminent industry thought leader via an engaging modular approach.The skills and knowledge you gain will be a great foundation to jump start or accelerate your IAM & ZT journey.Perfect for:- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee will receive the course materials.Warning: This live, in-person intensive has limited seating. Take advantage of this opportunity to learn about transformative cybersecurity technologies that can enable your business and minimize enterprise risk.Your organization’s cybersecurity can’t wait. Register now.9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursvCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: IvoryThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, September 11, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:30 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)The CISO's Egress Challenge: AI, Shadow IT, and the New Reality of Data SecuritySr. Director of Cybersecurity, Mastronardi ProduceRegistration Level:
VIP / Exclusive
8:00 am - 8:45 amLocation / Room: PearlAs enterprise data explodes across hybrid, multi-cloud, and on-premises environments, the role of the CISO has shifted from perimeter defense to a deeper understanding of the organization’s data footprint. This private, peer-to-peer roundtable brings together CISOs to discuss their journey with Data Security Posture Management (DSPM), exploring the pivotal shift from what data they have to where that data is going. You will examine how the proliferation of AI tools and the rise of new forms of “shadow IT”—applications and services that bypass official channels—have dramatically increased the reality and risk of unauthorized data egress. Come ready to share and explore practical strategies for discovery, monitoring, and control, offering insights on how to build a security posture that accounts for both known assets and unknown data flows in an age of distributed data.8:00 amCyber Squid Game: Don't Let Your Users Get Eliminated!Director, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: EmeraldCyber defenders often feel like Gi-Hun from Squid Game—desperately trying to warn others of the consequences of risky behavior. But fear alone doesn’t change behavior. In this talk, we explore research-backed insights from the National Cybersecurity Alliance’s Oh Behave! report to understand what really motivates users, why security fatigue is real, and how to influence secure behavior through empathy, smart design, and seamless workflows. Learn how to make secure choices the easiest ones—and walk away with practical ways to nudge your users (and leadership) in the right direction.
8:00 amInfraGard Michigan Members Alliance Chapter Meeting and Guest Speaker (Open to all attendees)Artificial Intelligence: Risks, Opportunities, and Influence on CrimeSupervisory Special Agent, Cyber Task Force, FBI Detroit Field OfficeRegistration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: AmethystThe development of Artificial Intelligence is developing rapidly. Risks and opportunities both exist. SSA Sczygielski will share threat actor use of the technology, as well as an awareness of how to protect oneself while online.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Securing the Motor City and Beyond: Lessons in Leadership from Top CISOsInformation Security, X; Deputy CISO, X MoneyCISO, City of DetroitCIO, City of DetroitGlobal Information Security Officer, Joyson Safety SystemsRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this keynote panel, top CISOs from Detroit and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Designed for cybersecurity executives and their teams, this panel provides actionable advice, strategic takeaways, and inspiration to kick off the 23rd edition of SecureWorld Detroit.9:45 amNetworking Break & Cyber ConnectAre You Smarter than a Middle Schooler? A CyberPatriot Challenge – Join this bonus session in the Networking HallSecretary / Treasurer, MCISSE Cyber Patriot ProgramCo-Founder & President, MCISSE Cyber Patriot ProgramAdvisory Board Chair, MCISSE Cyber Patriot ProgramRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallCome to the show floor to learn more about the MCISSE CyberPatriot Program, which is part of the national program by the same name. The coalition of colleges, universities, and industry experts is dedicated to showing students a clear pathway from high school to an associate, bachelor, master, or doctoral degree in cybersecurity, earning cybersecurity certifications all along the way. “Our hope is to have enough industry support to cover our expenses and ensure that every school in Michigan can participate in CyberPatriot,” said President Tamara Shoemaker.
10:15 amThe Global AI Dilemma: How the EU and U.S. Are Balancing Innovation and RegulationCyber Compliance Lead Auditor, Rockwell AutomationRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: JadeArtificial Intelligence is impacting our work, and every aspect of our lives, creating both possibilities and challenges. The European Union has enacted broad, mandatory regulations on AI. The United States is focusing on innovation and choosing a different approach by allowing states to decide for themselves. In this session, we explore these two distinct strategies, with a focus on the critical need to balance the protection of human rights and ethical standards, with support for technological advancement.10:15 amBreaking Protocol: Email Subversion in Dark-Net and AI RemediationDoctoral Researcher, Computer Science, Oakland UniversityRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: AmethystThe dark web hosts numerous encrypted email providers marketed as privacy-centric platforms. However, many of these services are increasingly subverted by malicious actors—ranging from cybercriminals to extremist groups—who exploit weak authentication protocols, flawed onion routing implementations, and unmonitored registration pipelines. This study identifies and demonstrates key vulnerabilities in these anonymous email infrastructures, including account hijacking, metadata leakage, and bot-based mass account creation. We showcase real-world exploitation tactics used to bypass safeguards and embed persistent backdoors.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsSr. Director, Engineering, Rocket MortgageChief Security Officer, PleasantreesDirector, Cyber Threat Management, Ford Motor CompanyPractice Owner, Harold J. Love & Associates; Captain, Michigan State Police (Ret.)Registration Level:
Open Sessions
10:15 am - 10:50 amLocation / Room: EmeraldThis panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.10:50 amNetworking Break & Cyber ConnectAsk Me Anything: Join this bonus session in the Networking HallvCISO, Cyber Risk Opportunities LLCRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallPull up a chair with Kip Boyle, longtime CISO, author of Fire Doesn’t Innovate, and host of the Cyber Risk Management Podcast. In this casual, 25-minute conversation, you set the agenda. Bring your questions on NIST CSF, AI, or career growth and walk away with useful insights from Kip and your peers.11:10 amPowerShell to PowerPoint: Transitioning from Practitioner to ManagerSr. Manager, IT Security, BorgWarnerRegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: JadeThe title is a about a joke I told a team member once: “I learned I was now a manager when my autocomplete filled PowerPoint instead of PowerShell.” This presentation is all about the journey one has to make to transition from a security doer to a security leader, including new responsibilities such as selling security to business leadership, team management, and the drama that comes with being a manager. This won’t be boring manager stuff, as I continue to be a lighthearted techie at heart. I’ve had the honor of managing a global team of extremely talented security engineers and analysts after nearly a decade of growing from an IT guy to a security analyst, engineer, and senior team lead. I present where you need to improve in the soft skills, and where you need to remain technical and analytical. This is a fun journey full of failures, eye opening experiences, and learnings along the way—guaranteed to make you laugh as well as take a note or two!
11:10 amSecuring the Future on Four Wheels: AI, Regulation, and Product Security in Connected VehiclesSr. Cybersecurity Product Analyst, ZF GroupSenior Cybersecurity and Compliance SME, May MobilityRegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: AmethystArtificial intelligence is rapidly transforming vehicles into highly connected, autonomous systems — but with this innovation comes new and complex security challenges. From adversarial AI attacks on perception models to vulnerabilities in vehicle-to-everything (V2X) communications, product security must evolve to keep pace with emerging threats. At the same time, regulators are beginning to establish frameworks that will define how manufacturers design, test, and secure vehicles of the future. This session will explore the intersection of AI, regulation, and product security in autonomous and connected vehicles, providing insights into current risks, evolving compliance requirements, and strategies to build security into products from the ground up.11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceField CTO, Sumo LogicSr. Solutions Engineer, AppOmniGRC Manager, Little Caesars EnterprisesRegistration Level:
Open Sessions
11:10 am - 11:45 amLocation / Room: EmeraldToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] Bridging the Gap: The Role of the BISO in Modern CybersecurityDirector, Cyber & Information Security, Inteva ProductsBISO, Sr. Manager, Healthcare & Education, Compass Group NADirector, Global Cybersecurity GRC and Data Privacy, UL SolutionsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO) — a critical yet often misunderstood role.In this engaging panel discussion, regional BISOs share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session helps demystify the BISO role and its importance in today’s security landscape.Attendees will gain:-
A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
-
Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
-
Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security and how mastering both can accelerate your career.12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Building Business Resilience Through Identity-First SecurityCISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: PearlRansomware and cybercrime have become top-tier threats to organizations in every industry. Securing endpoints, buying cyber insurance, even paying ransom—none of these options can prevent a business-ending attack. One step that is key to operational and business resilience? A dedicated, identity-first cybersecurity plan.
Join this closed-door, invitation-only, peer-to-peer discussion led by Jim Doggett, CISO at Semperis. Part of his level set explains why the ability to protect and quickly recover your core identity systems—Microsoft Active Directory (AD) and Entra ID, for most enterprise organizations—is vital to successful cyber disaster recovery.
This open forum exchange explores:
- What is the true cost of cybercrime?
- Why do some recommend an AD-specific security strategy?
- If fast AD recovery is important, and then why do so many companies fail to achieve it?
- The next steps to protect your hybrid AD environment
Generously sponsored by:
12:45 pmNetworking Break & Cyber ConnectLevel Up Your Cyber Game: Join this bonus session in the networking lounge of the Networking HallEditorial Director, National Cybersecurity AllianceDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallToday, good cyber skills are good life skills, and we’re here to put your mind through the motions! Join us in the networking lounge of the Exhibitor Hall during the post-lunch keynote break for a turbocharged gameshow and test your abilities! We will engage you with thrilling challenges and strategic quandaries. Come for essential info and practical techniques to safeguard your digital life after the stadium lights have dimmed. This user-focused trivia game demonstrates how utilizing quick wits, tricky quandaries and fast thinking can engage your user audience to move the needle on keeping their digital lives (and your organization’s network) safer.
Along with the 15 or so scored questions, the game show hosts will discuss topics raised in each of the questions. We will also answer audience questions and provide insight on key behaviors. We will utilize a trivia platform that allows the audience to play along and see their score compared to other players in the game.
1:15 pmVERIS: The Missing Link in Your Cyber Risk PlaybookSr. Analyst, InfoSec Governance, Risk & Compliance, AlixPartnersRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: JadeSecurity risk management and incident response often operate in silos, speaking different “languages” and missing opportunities to learn from each other. This presentation introduces VERIS (Vocabulary for Event Recording and Incident Sharing) as a unifying framework to bridge the gap between risk and security operations. We explore how VERIS’s structured A4 model (Actor, Action, Asset, Attribute) provides a common language for describing threats and incidents, enabling risk analysts to leverage real incident data for more accurate likelihood and impact assessments. Attendees will learn how to map risk scenarios to incident patterns, see examples (including insights from the 2025 Verizon Data Breach Investigations Report) of VERIS in action, and get practical guidance for integrating VERIS into spreadsheets, SIEMs, and GRC platforms.
1:15 pmCan More Policy, Regulation and Security Standards Protect the DoD?Technical Manager, Information Security, NSF InternationalDirector of Information Security, NSF InternationalRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: AmethystFor years organizations have looked for one go to standard. Was it going to be PCI, NIST, ISO, SOC, SOX? Now we have the answer and the winner is CMMC mandated by the Department of Defense for Defense Industrial Base Organizations. CMMC is being mandated to all organizations within the Defense Industrial Base (DIB) with a ramp up plan outlined in 32 CFR and a ecosystem of DIB organizations that will need to meet compliance requirements. The final rule 32 CFR published in 2024 the next rule 48 CFR is only a matter of time. If your organization has work in the DOD space or DIB space are you prepared for CMMC?
1:15 pm[Panel] Vitals of Cybersecurity: CISO Strategies for Securing Healthcare in a Connected WorldCISO, Corewell HealthCISO, Michigan Medicine at the University of MichiganCyber Fusion Center Director, Trinity HealthCISO, University of Michigan Regional Health NetworkRegistration Level:
Open Sessions
1:15 pm - 1:50 pmLocation / Room: EmeraldJoin this dynamic panel discussion featuring CISOs from leading Michigan health systems. The session explores the evolving cybersecurity landscape in healthcare, with insights into how top security leaders are navigating threats, protecting patient data, and building resilient infrastructures in an increasingly connected environment.1:50 pmNetworking Break & Cyber ConnectThe Evolution of Social Engineering – Join this bonus session in the Networking HallManaging Director, Profortis Solutions LLCRegistration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallSME Arun DeSouza will lead a discussion on how phishing, vishing, and smishing are now more targeted and complex, powered by AI to exploit humans, and how we can combat these threats. Join the conversation in the networking lounge of the Exhibitor Hall.
2:10 pmThe Origins of 'Pig Butchering' (Crypto Investment Fraud)Special Agent, Detroit Field Office, FBIRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: AmethystThis presentation explores the fastest growing and emotionally manipulative form of online fraud: cryptocurrency investment fraud, more commonly known as “pig butchering.” This session covers the origins of the highly lucrative scam industry, key features and red flags, investigative challenges, and the FBI’s innovative response to this global threat.
2:10 pmAI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security LeadersSr. Security Engineer, Exeter Finance LLCLead IT Security Engineer, Tyson FoodsRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: JadeAs quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?2:10 pmISSA Motor City Meeting and Guest Speaker (Open to all attendees)From Scripts to Shields: Automating Cyber Defenses with PowerShell & AISenior Software Engineer, Cornerstone Building BrandsRegistration Level:
Open Sessions
2:10 pm - 2:45 pmLocation / Room: EmeraldThis session is hosted by the ISSA Motor City Chapter. Come meet the board and get informed.
Cyber threats evolve faster than manual defenses can react. This session showcases how PowerShell automation, combined with AI-driven anomaly detection, can transform an organization’s security posture. Learn how to create automated response scripts, monitor indicators of compromise (IOCs), and integrate AI models into detection pipelines. The session includes demos and scenarios showing how automation helped reduce MTTR (mean time to respond) during real security incidents.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityHead of Cybersecurity, Yazaki North & Central America | EMEADirector, Information Security, RoushVice President, Information Technology, Detroit PistonsCISO, BorgWarnerRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.Expect candid insights on topics such as:-
The toughest decisions CISOs face daily
-
Emerging threats and how security leaders are preparing
-
The future of security operations, compliance, and resilience
-
Strategies for bridging the gap between security teams and executive leadership
-
Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- Abnormal AIBooth: 245
Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.
Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.
- AppOmniBooth: 200
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- Arista NetworksBooth: 360
Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.
- AxoniusBooth: 350
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.
- Cloud Security Alliance DetroitBooth: 100
- CyeraBooth: 120
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.
- InfraGard MichiganBooth: 220
The Michigan Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). Members will find access to a number of resources that are used on a day to day basis, and find a number of communication portals to assist in protecting critical infrastructure.
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
- ISC2 Greater DetroitBooth: 130
ISC2 is consists of over 80,000 members worldwide. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques. The Greater Detroit chapter was been established in 2012 to help bring together local professionals. Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification.
- ISACA DetroitBooth: 230
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Detroit area.
- ISSA Motor CityBooth: 140
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals. The Motor City chapter is located in the automotive capital of the United States, Detroit, MI. Our chapter is committed to educating, consulting, advising, and overall improving information security for our technology infrastructures.
- Michigan CyberPatriot ProgramBooth: 160
We provide in-person and online awareness presentations and training sessions across the state. We hold multiple Summer Camps across the state and an annual Awards event celebrating the student’s success. We attend cybersecurity associations recruiting volunteers for the mentoring program and to increase corporate support of this program. Our hope is to have enough industry support to cover our expenses and ensure that every school in Michigan can participate in CyberPatriot.
- MiHCC (Michigan Healthcare Cybersecurity Council)Booth: 340
Cybersecurity is an expanding field, especially as more organizations go digital. Healthcare has long been a favorite target amongst cybercriminals but has recently been hit even harder. Since its inception in 2017, the MiHCC—a non-profit, public-private partnership—has worked to protect critical healthcare infrastructure and institutions in Michigan by providing free educational workshops for the citizens, patients, workforce, and students of the Healthcare Industry in Michigan.
- Motorola SolutionsBooth: 210
Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration that’s critical for safer communities, safer schools, safer hospitals and safer businesses.
- National Cybersecurity AllianceBooth: 170
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- NexumBooth: 110
Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.
- PonduranceBooth: 250
Pondurance delivers world-class Managed Detection & Response (MDR), Incident Response (IR), Vulnerability Management, and Advisory Services to industries facing today’s most pressing and dynamic cybersecurity challenges. Our U.S. based Security Operations Center (SOC) offers personal, proactive, and around-the-clock cybersecurity to protect the human experience. We take a risk-based approach to cybersecurity; so you know you are protecting your most valuable assets and reducing your cyber risk.
Our mission is to ensure that every organization is able to detect and respond to cyber threats—regardless of size, industry or current in-house capabilities. We believe AI and automation alone aren’t enough, you need ingenious human experience because attackers aren’t machines, they are people. We combine our advanced platform with decades of human intelligence to speed detection and response and contain cybersecurity threats quickly to ultimately decrease risk to your mission.
- ProjectDiscoveryBooth: 270
ProjectDiscovery helps security teams detect real, exploitable vulnerabilities without the noise. We combine open source power with enterprise-grade scale, starting with Nuclei, our fast, customizable vulnerability scanner trusted by thousands of engineers. Nuclei delivers attacker-like detections using conditional logic, enabling teams to move beyond version matching and catch what truly matters. Trusted by teams at Elastic, Vercel, and thousands more, ProjectDiscovery brings open-source flexibility to enterprise workflows, enabling full visibility and faster remediation in minutes with zero setup friction. Start with Nuclei. Scale with ProjectDiscovery.
- Southeast Michigan Chapter of the Association of Certified Fraud Examiners (SEMCACFE)Booth: 280
The SEMCACFE is one of over 160 local chapters of the Association of Certified Fraud Examiners based in Austin, Texas. The ACFE is the world’s premier provider of anti-fraud training and education. Together with more than 95,000 members, the ACFE is reducing business fraud world-wide and inspiring public confidence in the integrity and objectivity within the profession. This organization is committed to further educating and training qualified individuals in the highly-specialized aspects of detecting, investigating and deterring fraud and white-collar crime.
- SemperisBooth: 240
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- Sumo LogicBooth: 260
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- ThreatLockerBooth: 320
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- U.S. Secret Service – Cyber Fraud Task ForceBooth: 150
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- WiCyS Michigan AffiliateBooth: 330
The Michigan WiCyS Affiliate is a part of Women in Cybersecurity (WiCyS), an international organization that connects women in cybersecurity from academia, research, and industry. The affiliate’s mission is to support the WiCyS global goal of advancing, retaining, and recruiting women in cybersecurity. The affiliate also aims to create a community of professional women who share similar passions and missions.
Arun DeSouza, InstructorManaging Director, Profortis Solutions LLCArun DeSouza is a renowned global cybersecurity executive, keynote speaker, and thought leader. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), Artificial Intelligence, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, data security, and privacy.
Arun earned M.S. and PhD degrees from Vanderbilt University. He is a Certified Information Systems Security professional (CISSP) and has earned the Certificate of Cloud Security Knowledge (CCSK). He was induced into the CISO Hall of Fame by the First Global Cyber Observatory and has won multiple industry awards.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Bill Lucas, ModeratorSr. Director of Cybersecurity, Mastronardi ProduceBill Lucas is a seasoned cybersecurity executive with over 17 years of experience protecting digital assets and sensitive data across the automotive, healthcare, and technology sectors. As head of Information Security, he has led the development and execution of enterprise-wide security strategies that address complex and evolving threats.
Bill’s expertise spans endpoint, application security, cyber defense, secure design, and enterprise risk management. He holds a master’s degree in information assurance with a specialization in Digital Forensics and is a Certified Information Systems Security Professional (CISSP).
A passionate advocate for innovation and knowledge-sharing in cybersecurity, Bill frequently contributes to the professional community through speaking engagements, publications, and mentorship.
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Andrew SczygielskiSupervisory Special Agent, Cyber Task Force, FBI Detroit Field Office
Steven AielloInformation Security, X; Deputy CISO, X MoneyMr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.
Andy DoldCISO, City of Detroit
Art Thompson IIICIO, City of DetroitIn 2021, Mayor Mike Duggan tapped Art Thompson to be the next Chief Information Officer for the City of Detroit, making him the City’s youngest CIO in history at age 34. Thompson has had many great accomplishments since stepping into his current role - including leading the technical security, cybersecurity and technology for the largest NFL draft in history in 2024, as well as successfully maintaining a balanced budget of $61M+ annually for the Department of Innovation and Technology (DoIT).
Prior to becoming CIO, Thompson served as the Director of Public Safety and Cyber Security for DoIT, where he led the implementation of the City’s first police body camera program. He has over sixteen years of technical experience in IT management and operations. He is a graduate of Eastern Michigan University with a degree in Supply Chain Management and holds a Certificate in Cybersecurity from Harvard University.
Maria Haight, ModeratorGlobal Information Security Officer, Joyson Safety SystemsMaria Haight is a seasoned technology executive with extensive expertise in cybersecurity, IT transformation, talent development, and vendor management, having served as both a Chief Information Officer (CIO) and Chief Information Security Officer (CISO). She currently serves as the Global Information Security Officer at Joyson Safety Systems.
Her expertise encompasses driving organizational change across various domains, including cloud and digital enablement, enterprise applications and platform integration, cybersecurity, data rationalization, automation, process enhancement, and workforce optimization.
Her diverse experience crosses various industries including: telecommunications (Nortel), consumer packaged goods (Kellogg), finance (KCCU & Zeal Credit Union), and print manufacturing (TGI Direct).
Donna DavisSecretary / Treasurer, MCISSE Cyber Patriot ProgramDonna Davis has more than 30 years of experience across various public sector disciplines including cybersecurity, environmental protection, grant and project administration, emergency management planning, housing, and economic development. In 2023, Donna joined Michigan CyberPatriot and currently serves in a leadership capacity as the organization’s Secretary/Treasurer and as a strategic outreach/planner for young adult career development. The Michigan CyberPatriot Program is a non-profit program that works to encourage middle and high school students to explore and enter Michigan-based careers in cybersecurity. Building on her decade-long cybersecurity career with the State of Michigan, Donna most recently was the Chief of Staff to the Chief Security and Chief Information Officer, helping to implement statewide cybersecurity strategies to protect public information systems and state of Michigan residents. Prior to her role as Chief of Staff, Donna served as the first Privacy and Information Security Officer for the Michigan Department of Natural Resources (DNR) where she developed the department’s first formal cybersecurity program that balanced privacy, actionable and non-actionable risk and data security compliance with the public sector requirement for right/need-to-know. Donna is a huge fan of the “green and white” and a supporter of her two alma maters: Michigan State and Eastern Michigan Universities.
Tamara Shoemaker, HostCo-Founder & President, MCISSE Cyber Patriot ProgramTamara's primary mission is to address the shortage of specifically educated and trained cybersecurity professionals. The funding she has obtained from the State of Michigan has allowed her to develop the Michigan CyberPatriot program. CyberPatriot provides a structured educational experience for well over 1,000 high school and middle school students, and cybersecurity teaching materials for Michigan’s K-12 educators. In that respect, she has facilitated the Center’s unique engagement in cybersecurity teaching at the middle and high school levels, primarily through innovative cybersecurity summer camps. In conjunction with this program, she created a digital badging system to further motivate and distinguish Michigan CyberPatriot participation, which is the first of its kind in the nation. Finally, she and her husband, Dan Shoemaker, published a groundbreaking book for secondary school teachers entitled “Teaching Cybersecurity” with CRC Press, which can be purchased on Amazon.
Tabice WardAdvisory Board Chair, MCISSE Cyber Patriot ProgramTabice A. Ward is a technology executive with 35 years of experience in the energy industry. She brings deep expertise in technology management, cybersecurity operations, and delivery of large-scale technology initiatives. Serving as Executive Technology Strategist at ChoiceTel, she partners with organizations to develop transformative technology strategies that drive business enablement and strengthen security programs. Additionally, she is an Executive Advisor for Hush, a tech startup, and adjunct professor at the University of Detroit Mercy.
Her previous roles include serving as Area Vice President, Enterprise Security at Xcel Energy and IT Director/CISO at DTE Energy. Her visionary leadership and expertise make her a sought-after board member and speaker. She serves as a board member for CXO Forum and Advisory Board Chair for Michigan CyberPatriot Program. Tabice holds a master’s degree in Information Assurance from the University of Detroit Mercy, CISO graduate certificate from Carnegie Mellon Heinz College and several professional certifications.
Enida MetajCyber Compliance Lead Auditor, Rockwell AutomationEnida Metaj is an award-winning cybersecurity leader with more than 14 years of experience across cybersecurity, IT, and finance. She currently serves as Cyber Compliance Lead Auditor for Rockwell Automation, a Fortune 500 company operating within the nation’s critical infrastructure. She was named a “40 Under 40” award recipient by Oakland County Government, in recognition of her exceptional leadership, innovation, and community service, highlighting her contributions to driving positive change locally and beyond.
Enida holds a Bachelor of Laws degree and a master’s in public administration, combining legal and policy expertise with technical acumen. She has further specialized in cybersecurity through a master’s certificate in Enterprise Cybersecurity Leadership, a Certificate in Exercising Leadership from HarvardX, and professional certifications in ISO standards and artificial intelligence. Certified Information Security Manager (CISM), demonstrating expertise in information security governance, risk management, and incident response.
A respected thought leader, she has served as a judge for high-impact industry events including the 2024 SC Media Cybersecurity Awards and the CyberShark Pitch Competition, recognizing excellence and innovation across the cybersecurity landscape. Beyond her professional achievements, she is deeply committed to giving back—volunteering as a mentor to women in cybersecurity and actively empowering the next generation of leaders. As the Employment Director for ISSA Motor City, she leads initiatives focused on job placement within the information security community, building strong partnerships with employers to create sustainable employment pathways for members. Through strategic planning and hands-on support, she aligns candidates with opportunities that fit their skills, career goals, and long-term growth potential.
This dedication is further reflected in her role as a NICE | NIST Cybersecurity Career Ambassador, helping to advance national efforts in cybersecurity education, training, and workforce development.
Sarath ShankerDoctoral Researcher, Computer Science, Oakland UniversitySarath Shanker is a Ph.D. candidate in Computer Science at Oakland University, specializing in cybersecurity and artificial intelligence. He holds a Master’s degree from Northeastern University, Boston, and has more than 10 years of industry experience in software development, cloud infrastructure, and AI systems. His research focuses on adversarial threats in privacy-preserving environments, darknet infrastructure security, and the ethical use of AI in cyber defense.
Leah ForemanSr. Director, Engineering, Rocket MortgageLeah Foreman is a cybersecurity leader with more than 17 years of experience leading IT Risk, IT Compliance, Identity Engineering and Access Management, Asset Management, Security Awareness, Application Security, Cloud Security and Program Management functions. Currently she serves as a Senior Director of Security Engineering at Rocket Mortgage in Detroit where she leads cross functional enterprise security projects and engineering excellence initiatives with a mission of making the securest thing the easiest thing. Leah previously held roles at Google and KPMG, and maintains her CISSP.
Eric MackChief Security Officer, PleasantreesEric Mack is an internationally recognized expert in operations, health & safety, and external affairs, with over two decades of cross-industry impact. A Licensed Fraud Investigator and Certified Emergency Manager for more than 20 years, Eric has advised leading organizations across healthcare, government, and the private sector on risk mitigation, regulatory compliance, and organizational resilience.
Renowned for his strategic leadership in safety, security, and emergency preparedness, Eric has played a pivotal role in building high-performing systems that prioritize both regulatory integrity and human well-being. He is widely respected as a trusted advisor and operator at the intersection of crisis management and business continuity.
Stephanie ScheuermannDirector, Cyber Threat Management, Ford Motor CompanyStephanie Scheuermann is the Director of Cyber Threat Management at Ford Motor Company, where she heads Data Protection Services. Her journey at Ford began in 1996, and after various roles within Ford Credit, she made a significant shift in 2004 to focus exclusively on cybersecurity. Since then, under her leadership, Stephanie has been instrumental in establishing a robust global Cyber Defense team, enhancing Ford's capabilities in Incident Response, Electronic Discovery & Digital Forensics, and Threat Intelligence. Acknowledged as a Technical Leader in Cyber Threat Intelligence in 2018, her academic credentials include a BS in Management Information Systems from Cleary University, an MS in Information Assurance from Walsh College, and has been CISSP certified since 2004. Stephanie has recently pioneered the Ford Women in Cyber Security community, securing a Tier 1 Partnership with WiCyS to promote women's involvement in cybersecurity.
Harold J. Love, ModeratorPractice Owner, Harold J. Love & Associates; Captain, Michigan State Police (Ret.)
Kip Boyle, ModeratorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Ryan MostillerSr. Manager, IT Security, BorgWarnerRyan Mostiller is a security leader in the Metro Detroit community, currently serving as the Security Operations Manager for BorgWarner. After more than a decade in both technical and management roles in security, Ryan enjoys any opportunity to engage with fellow practitioners and share learnings. Ryan has worked across various industries and within several Fortune 500 companies, most recently in the automotive industry.
Ryan has a Masters in IT Management from Oakland University and bachelors in Information Technology, along with security certifications from GIAC. You may have seen other presentations that Ryan has created and presented at, including SecureWorld, GrrCON, ISC2, and Evanta. Ryan has also developed and teaches an OU Executive MBA course at Oakland University titled "Cybersecurity for Executives."
Tyson BensonSr. Cybersecurity Product Analyst, ZF Group
Hemanth TadepalliSenior Cybersecurity and Compliance SME, May MobilityHemanth Tadepalli serves as the Senior Cybersecurity & Compliance Subject Matter Expert (SME) at May Mobility, a company revolutionizing transportation through advanced autonomous vehicle technology. His career spans notable roles at prestigious organizations, including management consulting firm AlixPartners, cybersecurity leader Mandiant, tech giant Google, and Michigan-based cybersecurity startup SensCy.
Hemanth’s research focuses on advancing cybersecurity in critical areas such as autonomous vehicle security, Internet of Things (IoT) security, threat intelligence, risk management, API security, and election security. He was appointed by Michigan Secretary of State Jocelyn Benson to the Advisory Task Force overseeing statewide election security and integrity.
In addition to his technical contributions, Hemanth has published numerous articles on cybersecurity and emerging technologies, showcasing his thought leadership. He is a sought-after speaker, invited to present at prominent cybersecurity conferences, serve as a distinguished panelist, and share insights on technology-focused podcasts. His impactful work has earned him accolades, including the 40 Under 40 recognition from Oakland County, Michigan, and the Governor’s Service Award for his philanthropic efforts and community service in cybersecurity.
Hemanth earned his bachelor’s degree in Computer Science from Kettering University, concentrating in cybersecurity and minoring in Pre-Law, Innovation, and Entrepreneurship. He went on to earn his master’s degree in Cybersecurity and Information from the University of California, Berkeley, where he was honored as the student commencement speaker. He is currently a Ph.D. candidate at Dakota State University, specializing in cyber defense. In addition to his academic pursuits, Hemanth serves in elected office for the City of Troy and sits on the Board of Directors for Kettering University.
Chas ClawsonField CTO, Sumo LogicAs a technologist interested in disruptive cloud technologies, Chas joined Sumo Logic's Cyber Security team with over 20 years in the field, consulting with many federal agencies on how to secure modern workloads. In the federal space, he spent time as an architect designing the Department of Commerce ESOC SIEM solution. He also worked at the NSA as a civilian conducting Red Team assessments and within the Office of Compliance and Policy. Commercially, he has worked with MSSP practices and security consulting services for various Fortune 500 companies. Chas also enjoys teaching networking and cybersecurity courses as a Professor at the University of Maryland Global Campus
Terry OlaesSr. Solutions Engineer, AppOmniTerry has been working alongside security practitioners to advise on challenges around SaaS security, threat exposure, security policy, and managing attack surfaces for the past 10 years. His insights come from 15+ years supporting global enterprises like MCI Worldcom, Gap Inc., IBM, and Neiman Marcus Group with architecting, engineering, securing, and auditing hybrid infrastructure environments. He enjoys building bridges between technology and the business teams to reduce the friction typically inherent in securing the enterprise.
Denise Browning, ModeratorGRC Manager, Little Caesars EnterprisesDenise Browning is a Governance, Risk, and Compliance Manager with Little Caesars Enterprises. She is a seasoned IT professional with more than 20 years in Information Security in healthcare, automotive, retail, and hospitality industries. She is active with multiple professional organizations, including the Michigan Council of Women in Technology, ISACA, ISSA, WiCyS, and InfraGard. She has worked as an adjunct instructor at Monroe County Community College.
Ahmeed AhmeedDirector, Cyber & Information Security, Inteva ProductsAhmeed is the Director of Cyber and Information Security at Inteva Products, a global Tier-I automotive supplier. In his role, he oversees three key areas: Cyber Defense, Information Security, and Data Privacy (with a particular focus on privacy requirements for the company’s EU entities). His strategic oversight and leadership ensures the organization’s cybersecurity program alignment with the business.
With over 20 years of experience across various sectors such as telecommunications, education, and manufacturing, Ahmeed brings a wealth of knowledge to his position. He holds a bachelor’s degree in Computer and Control Engineering and an MBA from Central Michigan University, along with several professional certifications.
Morgan FleckBISO, Sr. Manager, Healthcare & Education, Compass Group NAMorgan Fleck is a Senior Manager in the Compass Group Business Information Security Office (BISO), where she leads cybersecurity initiatives across the healthcare and education sectors. With a foundation in healthcare, Morgan brings a unique perspective to cybersecurity—one that bridges patient care, regulatory compliance, and digital risk management.
With over 20 years of experience, Morgan started her career in healthcare, gaining knowledge of operational and privacy challenges faced by clinical teams. She now utilizes this understanding to assist organizations in managing cybersecurity and compliance complexities, turning technical requirements into practical strategies aligned with business needs.
Morgan focuses on connecting technical and non-technical stakeholders to ensure cybersecurity is viewed as a strategic advantage. Recognized for her leadership and comprehension of healthcare workflows, she collaborates with cross-functional teams to optimize governance, risk, and compliance (GRC) processes and implement scalable solutions that balance innovation and security.
Nicole RembertDirector, Global Cybersecurity GRC and Data Privacy, UL SolutionsNicole Rembert is an experienced transformational leader with multiple years of experience in information technology and cybersecurity. Over the course of Nicole’s career, she has developed an exceptional business acumen within healthcare and financial organizations. Nicole recently joined UL Solutions as the Global Cybersecurity Governance, Risk, Compliance and Data Privacy Director.
Prior to joining UL Solutions, she led multiple large cybersecurity initiatives at Blue Cross Blue Shield Michigan as the Director, Security Programs, Governance and Compliance. She has extensive experience in areas such as creating effective strategies, budget management, program oversight, compliance and risk management.
Nicole Rembert holds a Bachelor of Science degree from Western Michigan University, a Master of Science in Information Technology from Lawrence Technological University, maintains three highly-accredited certifications: Project Manager Practitioner (PMP), Certified ScrumMaster (CSM) and HITRUST Certified CSF Practitioner (CCSFP), and is pursuing a Certified Information Security Manager (CISM) certification. She is a member of several organizations, including the Information Technology Senior Management Forum (ITSMF) and Alpha Kappa Alpha Sorority, Incorporated.
Nicole believes in the importance of mentoring and giving back. She served as a mentor for young women for multiple organizations and currently mentors women interested in technology and cybersecurity.
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Barry EitelEditorial Director, National Cybersecurity AllianceBarry crafts resources and news reports for the general public and cybersecurity specialists. He has written about technology, finance and small business for Insure.com, Policygenius, and Lendio. He was the Silicon Valley Correspondent for Turkey’s Anadolu Agency. He is also a playwright and screenwriter, and several of his plays have been produced around the country. He received his MFA in Dramatic Writing from NYU Tisch.
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Peter ShamoonSr. Analyst, InfoSec Governance, Risk & Compliance, AlixPartnersPeter Shamoon serves as the Security Risk Management Senior Analyst at AlixPartners, where he architects and oversees the firm’s security-risk program—from enterprise-wide threat identification and assessment to ongoing control validation and executive-level reporting. Drawing years of experience in risk evaluation, framework governance, and control assurance, he translates complex cyber threats into clear, business-driven actions.
Peter holds both a bachelor’s and a master’s degree in Cybersecurity & Information Assurance from the University of Detroit Mercy. He is also credentialed as a Certified in Risk and Information Systems Control (CRISC) professional and is Open FAIR certified.
Rhia DancelTechnical Manager, Information Security, NSF InternationalAs Technical Manager, Information Security, at NSF, Rhia Dancel supports clients with risk management within the information security landscape to achieve effective security objectives and goals. Dancel is an Lead CCA, ISO/IEC 27001, 20000-1 and 9001 Lead Auditor for NSF and is the Technical Lead for Cybersecurity Maturity Model Certification program (CMMC).
Dancel has worked at NSF for over a decade. She previously held several auditing and technical positions in the information security and pharma quality sectors. She has completed technical writing work and audits for NSF throughout North America, working directly with customers on-site and remotely developing security control matrices. She has developed and built a risk-based platform that supports industry best practices for treating and mitigating risk and worked with multiple academic leaders on information security and awareness.
Tony GilesDirector of Information Security, NSF InternationalAs Director of Information Security, at NSF, Tony Giles leads the teams that audit and certify organization’s information security systems. Giles is an ISO/IEC 27001, ISO/IEC 20000-1 and ISO 9001 Lead Auditor and is involved with the Cybersecurity Maturity Model Certification program (CMMC). Giles has spent nearly two decades of his career with NSF, having previously served as Director of Custom Audit Programs, Director of Operations, Director of Business Development and Service Delivery Manager. He has conducted audits globally for over 10 years and worked on large-scale security implementation projects, including NIST 800-171, NIST 800-88, ISO/IEC 27001, ISO 28000 and other custom security standards. He has also conducted audits for DoD suppliers and private sector organizations, implementing security assessment programs focused on multiple security controls, cryptographic erasure and other custom security programs.
Scott D. DresenCISO, Corewell HealthScott D. Dresen, MBA, FACHE, FHIMSS, CISSP, CISM is the chief information security officer of Corewell Health. As the CISO, Scott is accountable as the strategic leader responsible for implementing and operating the enterprise information security program across all Corewell Health divisions, and shares responsibility for leading the enterprise business assurance program including emergency management, business continuity, and operational readiness. Prior to his current Corewell Health role, Scott served as Senior Vice President & CTO/CISO for Spectrum Health where he was accountable for enterprise infrastructure, cloud services, and enterprise security. Before joining Spectrum Health in 2007, Scott served as chief information officer for the Wayne State University Physician Group, where he was responsible for the strategic growth and development of information technology services and capabilities supporting the Wayne State University School of Medicine and its multi-specialty group practice. Scott has significant experience delivering innovative information technology solutions in academic, for-profit, and not-for-profit health care systems. Combining strong business acumen with passions for both technology and security, he strives to enable business value realization by leveraging risk informed decision making to deliver secure digital services and capabilities.
Jack KufahlCISO, Michigan Medicine at the University of MichiganJack Kufahl serves as the Chief Information Security Officer for Michigan Medicine at the University of Michigan. With over 20 years in information technology leadership, he is a founding officer of the Michigan Healthcare Cybersecurity Council (MiHCC), a public-private partnership supporting Michigan’s healthcare sector. Jack is a graduate of the FBI CISO Academy and the U.S. Army War College National Security Seminar. He also holds a Master of Legal Studies with a concentration in compliance law from Washington University in St. Louis.
In addition to his role at Michigan Medicine, Jack advises several startups and entrepreneurial ventures, offering expertise in information security, privacy, and digital risk. His work supports the safety and resilience of healthcare systems, benefiting Michigan’s citizens, patients, workforce, and students.
Matt PostingerCyber Fusion Center Director, Trinity HealthMatt is a seasoned cybersecurity leader with more than a decade of experience in healthcare and manufacturing. As Cyber Fusion Center Director at Trinity Health, he oversees operational cybersecurity including incident response, threat intelligence and monitoring. Matt specializes in executive-level incident response leadership, cyber resilience, and strengthening security operations in healthcare.
Greg SiegCISO, University of Michigan Regional Health NetworkGreg Sieg is the Chief Information Security Officer (CISO) for the University of Michigan Regional Health Network, where he leads the Information Assurance department for the University of Michigan Health-West and University of Michigan Health-Sparrow. With more than 16 years of experience in Information Systems, Cybersecurity, Governance, and Critical Infrastructure, Greg brings a wealth of expertise to the healthcare sector. In addition to his professional role, Greg serves as the president and chairman of the Michigan Healthcare Cybersecurity Council (MiHCC), a non-profit dedicated to improving the cybersecurity posture of healthcare organizations across the state of Michigan.
Arun DeSouza, ModeratorManaging Director, Profortis Solutions LLCArun DeSouza is a renowned global cybersecurity executive, keynote speaker, and thought leader. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), Artificial Intelligence, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, data security, and privacy.
Arun earned M.S. and PhD degrees from Vanderbilt University. He is a Certified Information Systems Security professional (CISSP) and has earned the Certificate of Cloud Security Knowledge (CCSK). He was induced into the CISO Hall of Fame by the First Global Cyber Observatory and has won multiple industry awards.
Julia MacBethSpecial Agent, Detroit Field Office, FBIJulia MacBeth is a Special Agent with the Federal Bureau of Investigation (FBI) assigned to the Detroit Field Office where she leads the Detroit Financial Crimes and Fraud Task Force (DFFACT) and coordinates a national scam victim notification initiative. Formerly, Special Agent MacBeth was assigned to the Cyber Enabled Fraud and Money Laundering Unit located at FBI headquarters, where she was the FBI’s Elder Justice Coordinator and Cyber Enabled Frauds Program Manager, helping to create investigative strategy to mitigate the threat of international scam organizations.
Ankit GuptaSr. Security Engineer, Exeter Finance LLCAnkit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.
Shilpi MittalLead IT Security Engineer, Tyson FoodsShilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.
Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.
Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.
Bhaskar Bharat SawantSenior Software Engineer, Cornerstone Building BrandsBhaskar Bharat Sawant is a Senior Software Engineer and Team Lead at Cornerstone Building Brands with over 15 years of experience in enterprise architecture, cloud development, and regulatory compliance. Bhaskar has led initiatives in AI-driven testing, data privacy engineering, and pricing automation across complex .NET and Azure ecosystems. He is an IEEE Senior Member and a frequent reviewer and speaker at national and international tech conferences.
Janette BarrettoHead of Cybersecurity, Yazaki North & Central America | EMEAAs a cybersecurity leader, Janette drives global cybersecurity and information security programs, ensuring enterprise-wide protection and compliance with evolving regulations. Her curiosity fuels her passion for learning and staying ahead in the field.
Collaboration is key to success, whether working with C-suite executives, peers, or cross-functional teams to drive major security initiatives.
Rajesh NanwaniDirector, Information Security, RoushRajesh is a seasoned cybersecurity leader who has built and led global cybersecurity programs with a strong focus on protecting critical assets and ensuring compliance with frameworks such as CMMC, NIST, SOC 2, and ISO 27K.
He holds multiple industry-recognized certifications and is dedicated to advancing enterprise security posture through continuous improvement and proactive defense against evolving cyber threats.
Paul RapierVice President, Information Technology, Detroit PistonsPaul Rapier, Vice President of IT for the Detroit Pistons, is a seasoned technology leader with 25 years of IT experience, including a decade in management. Known for his expertise in driving innovation within the sports industry, Paul actively shares his knowledge as a sought-after speaker at cybersecurity conferences and contributes to technology-driven initiatives in professional sports. He also serves on the Advisory Council for SecureWorld Detroit, where he helps shape cybersecurity standards and practices. His diverse skill set enables him to craft IT strategies that enhance efficiency and competitiveness.
Juman Doleh-Alomary, ModeratorCISO, BorgWarnerJuman Doleh-Alomary is BorgWarner's Chief Information Security Officer and an active volunteer board member of the ISACA Detroit Chapter. With over 15 years of experience in security, audit, investigation, compliance, and privacy policy/standards,
Juman most recently held the position of Director of Cybersecurity GRC at Little Caesar's Enterprises serving the Ilitch holdings portfolio of companies. Her prior positions include Director of IT Audit at Wayne State University and a significant tenure in IT and Risk Management at Ford Motor Company.
A leader within the ISACA community, Juman has held various roles, including past president and, notably, chair of the IIA/ISACA Spring Conference, which achieved a record attendance. She is active volunteer with Michigan Council of Women in Technology (MCWT), Women Security Alliance (WomSA), and on the advisory board of Women in Cyber (WiCyS) Michigan.
An alumnus of the University of Michigan, she holds both a bachelor’s and a master’s degree, complemented by an impressive suite of certifications: CISA, CISM, CRISC, CDPSE, and ISO 27001.
Happy Hour
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes













