Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, November 13, 2025
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

    11:00 am
    [Opening Keynote] When Policy Isn't Enough: Enforcing Zero Trust Before It's Too Late
    • session level icon
    speaker photo
    CTO, Imprivata
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    A well-crafted access policy might look airtight on paper—but reality tells a different story. When security measures slow productivity, users find workarounds, unintentionally opening doors to outside threats.

    In this session, Joel Burleson-Davis, CTO of Imprivata, shares how to bridge the gap between policy and practice. Learn how to design policies that users will actually follow, enforce access seamlessly, and detect anomalous behavior before small slips become major breaches.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Behavioral Threat Intelligence: Profiling the Human Adversary
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    To stop an adversary, you must first understand them. This session moves beyond traditional cyber defense to explore the human element driving attacks on critical infrastructure. In “Behavioral Threat Intelligence,” we dissect the “who” and “why” behind today’s most significant threats—from nation-state sabotage to criminal campaigns. By examining the psychological drivers, cultural biases, and cognitive patterns of attackers, we reveal how to anticipate their next move. You will leave with practical strategies for integrating behavioral profiling with technical intelligence, transforming your ability to predict, attribute, and neutralize threats to the systems we all depend on.
    12:00 pm
    The Global AI Dilemma: How the EU and U.S. Are Balancing Innovation and Regulation
    • session level icon
    speaker photo
    Cyber Compliance Lead Auditor, Rockwell Automation
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Artificial Intelligence is impacting our work, and every aspect of our lives, creating both possibilities and challenges. The European Union has enacted broad, mandatory regulations on AI. The United States is focusing on innovation and choosing a different approach by allowing states to decide for themselves. In this session, we explore these two distinct strategies, with a focus on the critical need to balance the protection of human rights and ethical standards, with support for technological advancement.
    12:00 pm
    AI-Augmented Threats in Higher Education: Who's Being Targeted and Why
    • session level icon
    speaker photo
    Solutions Architect, Proofpoint
    speaker photo
    VP, Industry Solutions, Proofpoint
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    AI-powered cyber threats are rising in higher education, with targeted phishing and deepfake attacks becoming more sophisticated. As the attack surface expands, colleges and universities must focus on securing workforce identity—often the weakest link. A layered, human-centric defense is key to protecting faculty, students, and staff.

    Join Proofpoint’s Ryan Witt and Chris Montgomery for a discussion on the latest threat intelligence and strategies to help institutions better understand and defend against today’s advanced cyberattacks.

    We will explore:

    • Emerging AI-enabled attack trends 
    • Threat insights into which departments and roles are most at risk  
    • Actionable strategies to proactively defend against these advanced AI attacks 
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    1:00 pm
    The Psychology of Phishing: Designing Human‑Centered Awareness Programs
    • session level icon
    speaker photo
    GRC Officer, Georgia Tech Research Institute
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Phishing is still the most common attack method because it taps into natural human biases. In this session, we’ll break down the key psychological triggers—like authority, urgency, and social proof—that make these attacks work.

    You’ll learn how to build awareness programs that actually connect with employees by focusing on what motivates real behavior. We’ll walk through a practical framework for designing empathy-based simulations, tracking behavior change over time, and improving your training based on what works.

    You’ll walk away with a proven, psychology-based blueprint and ready-to-use templates to build phishing awareness programs that cut click rates by over 30% in just three months.

    1:00 pm
    The Essentials of Building a Foundational Cybersecurity Program to Safeguard AI Systems and Applications
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Artificial intelligence, including Generative AI and Large Language Models (LLMs), is rapidly transforming business and technology. As organizations adopt AI, new and evolving cybersecurity risks emerge. This accelerated session provides cybersecurity practitioners with the essential knowledge and actions needed to immediately begin safeguarding AI systems.

    The session will focus on three critical, actionable areas:

    1. Understanding the Core AI Attack Surface and Key Threats
      This module provides a rapid-fire overview of the AI landscape, defining essential terms like Generative AI, LLMs, and AI Agents. It will quickly pivot to identifying the most critical AI threats and vulnerabilities, focusing on Adversarial AI and the immediate takeaways from the OWASP Top 10 for LLM Applications.
    2. Essential AI Security Controls and Frameworks
      This section will present a concise, high-level overview of practical, industry-leading security frameworks applicable to AI. The focus will be on the core principles and immediate actions derived from resources like the NIST SP 800-218A Secure Software Development Practices for Generative AI and the Google Secure AI Framework (SAIF). Attendees will learn what controls to prioritize in their current cybersecurity programs.
    3. Integrating AI Risk and Governance into Existing Programs
      We will discuss the fundamental steps for incorporating AI into your organization’s existing Risk Management, Compliance, and Governance structure. This includes a look at the NIST AI Risk Management Framework (RMF) and an overview of emerging global regulations (e.g., the EU AI Act) to help organizations prepare for AI audits and policy development.

    From this session, attendees will gain a foundational understanding of the AI-driven attack surface and immediate, actionable steps to integrate AI security, risk management, and governance into their current cybersecurity strategy.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    The Cyber Frontier: Navigating Security Challenges Posed by AI, Quantum Computing, and Emerging Technologies
    • session level icon
    speaker photo
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    This presentation examines the critical cybersecurity challenges and opportunities presented by the rapid advancement of emerging technologies, which are advancing faster than society’s ability to absorb and understand them.

    The first core focus is on Artificial Intelligence (AI), which acts as a double-edged sword in the security landscape. AI is a powerful enabler for defense, capable of mitigating threats through automated process monitoring, predictive analytics, malware identification, and autonomous patching. Conversely, cyber attackers are leveraging offensive AI to create sophisticated, self-mutating (polymorphic) malware that can learn from failed attacks and self-propagate by exploiting system vulnerabilities.

    Next, the discussion addresses Quantum Computing, and the impending risk of “Q-Day”. Large-scale quantum computers, once operational, will be able to use Shor’s algorithm to break all current public key cryptosystems, including RSA, Diffie-Hellman, and Elliptic Curve Cryptography. This mandates an urgent global transition to new, stronger post-quantum algorithms (cryptosystems).

    Finally, the presentation highlights Emerging Sector Risks, specifically focusing on the cyber vulnerabilities of commercial space and satellite systems, which are increasingly seen as critical infrastructure. Weaknesses often stem from the use of long-range telemetry with open telecom network security protocols, which offer numerous inroads for attackers.

    To secure the future, strategies must be proactive, requiring substantial research investment in both AI and cybersecurity9999. Essential principles include adopting a Zero Trust architecture, implementing Security by Design, and preparing for the necessary shift to Post-Quantum Cryptography.

    2:00 pm
    Breaking Protocol: Email Subversion in Dark-Net and AI Remediation
    • session level icon
    speaker photo
    Doctoral Researcher, Computer Science, Oakland University
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    The dark web hosts numerous encrypted email providers marketed as privacy-centric platforms. However, many of these services are increasingly subverted by malicious actors—ranging from cybercriminals to extremist groups—who exploit weak authentication protocols, flawed onion routing implementations, and unmonitored registration pipelines. This study identifies and demonstrates key vulnerabilities in these anonymous email infrastructures, including account hijacking, metadata leakage, and bot-based mass account creation. We showcase real-world exploitation tactics used to bypass safeguards and embed persistent backdoors.

    2:00 pm
    Threat Landscape 2025: Navigating Identity, Scams, and Resilience in Government & Higher Education
    • session level icon
    speaker photo
    Sr. Director of Product Management for Privileged Access, Imprivata
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Government agencies and higher education institutions face a unique and relentless cyber offensive, balancing mission-critical services with resource constraints and transient user populations. This expert panel dissects the threat landscape, focusing on the vectors that exploit people and trust.

    Lisa Plaggemier of the National Cybersecurity Alliance will reveal why college students are prime targets for sophisticated scams and how to build effective security behaviors. Russell Dowdell of Imprivata will address the escalating chaos of Identity Governance, focusing on third-party access, cloud sprawl, and the critical need to secure non-human identities. Join these experts for a discussion on actionable strategies to boost operational resilience and navigate the complex, often underfunded, journey toward Zero Trust in the public sector.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    [Panel] Critical Data, Critical Hits: Cybersecurity Leaders on the Front Lines
    • session level icon
    speaker photo
    Associate CISO, St. Luke's University Health Network
    speaker photo
    CISO, Snohomish County, Washington
    speaker photo
    CISO, City of Chicago, Department of Technology & Innovation
    speaker photo
    CISO, Washington State Liquor and Cannabis Board
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    What does it take to lead cybersecurity for a city or county, a multi-billion dollar healthcare network, or a state’s regulatory body for a new industry? This panel cuts straight to the reality of protecting critical public services and high-value data from relentless attacks. The conversation will focus on the hard-won lessons and tackle the immediate, tactical issues like securing an explosion of remote work devices, managing legacy technology, and fighting the growing sophistication of social engineering. Learn how these leaders prioritize risk, build resilient systems on public-sector budgets, and prepare their organizations for the inevitable “critical hit.”
    3:00 pm
    Cyber Intelligence Briefing: Defending Public Trust and Civic Infrastructure
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Government agencies at every level are on the front lines of a persistent cyber conflict, entrusted with safeguarding citizen data, delivering essential services, and upholding public trust. This presentation delivers a focused intelligence briefing on the threats facing the public sector. We will dissect recent attacks on civic infrastructure, analyze the tradecraft of nation-states engaged in cyber espionage, and map the emerging trends in criminal campaigns targeting government entities. This session is designed for public sector leaders and technical staff, providing actionable intelligence to harden defenses, ensure the continuity of government, and protect the sensitive data that powers our society.
    3:00 pm
    Enhancing Security, Easing Compliance: PCI DSS for Multi-Payment Channel Organizations
    • session level icon
    speaker photo
    Managing Director, Schellman
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Navigating PCI DSS compliance can be daunting for multi-payment channel merchants and service providers handling diverse transaction environments. This presentation explores practical strategies to reduce compliance burden while bolstering security. Attendees will learn how simple process changes, such as tokenization and point-to-point encryption, can minimize sensitive data exposure. We’ll also examine the benefits of outsourcing specific PCI DSS responsibilities to trusted third-party providers, enabling organizations to focus on core operations without compromising security. Drawing on real-world examples, the session will highlight how these approaches streamline compliance efforts, reduce costs, and enhance protection across online, in-store, and mobile payment channels. Ideal for merchants and service providers, this talk offers actionable insights to achieve PCI DSS compliance efficiently.
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] Wrecking Ransomware with Defense-in-Depth
    • session level icon
    speaker photo
    Director, Product Marketing, Huntress
    speaker photo
    Sr. Hunt & Response Analyst, Huntress
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Ransomware is a massive and persistent problem, and ALL businesses are targets. But defending against these attacks is sometimes treated like an endpoint security issue, giving ransomware groups and threat actors like initial access brokers a major advantage over businesses and organizations working to defend themselves.

    In this presentation, we teach you how to defend against ransomware attacks with a “defense-in-depth” approach—from humans to identities to infrastructure to endpoints—to give you the upper hand. We’ll dive into real-life ransomware events the Huntress SOC and threat hunting team has dealt with, so you can see how a defense-in-depth approach wrecks attackers.

Exhibitors
  • Huntress
    Booth:

    Protect Your Endpoints, Identities, Logs, and Employees.

    The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.

    By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most under-resourced businesses defend against today’s cyberthreats.

    As long as hackers keep hacking, we keep hunting.

  • Imprivata, Inc.
    Booth:

    Imprivata delivers access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata’s platform of innovative, interoperable access management and privileged access security solutions enable organizations to fully manage and secure all enterprise and third-party identities to facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership.

  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Joel Burleson-Davis
    CTO, Imprivata

    Joel Burleson-Davis is the Chief Technology Officer at Imprivata where he’s responsible for building, delivering, and evolving the suite of Imprivata’s cybersecurity products that include Privileged Access Management, Privacy Monitoring, and Identity Governance solutions.

    Prior to joining Imprivata, Joel was CTO at SecureLink, the leader in critical access management for organizations in need of advanced solutions to secure access to their most valuable assets, including networks, systems, and data. While at SecureLink, Joel was responsible for the overall technology and operational strategy and execution including direction and oversight for Product Development, Quality Assurance, IT and Cybersecurity Operations, Compliance, and Customer Success.

    Before SecureLink, Joel held Systems Engineering, IT Consulting, and Instructor positions while serving as one of the founding members of The Linux Foundation certification committee, a global committee of key Linux subject matter experts. Joel earned a Master of Liberal Arts degree in Systems Theory and Technology from St. Edward’s University, and a Bachelor of Arts degree in Philosophy and Religious Studies from Texas Lutheran University.

    Fun Facts: When he’s not helping customers, Joel likes to cook. In particular, he’s a bread enthusiast, from babka and brioche to Detroit-style pizza to rustic sourdough. He also enjoys adventuring with his wife, two daughters, and their bulldog.

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Enida Metaj
    Cyber Compliance Lead Auditor, Rockwell Automation

    Enida Metaj is an award-winning cybersecurity leader with more than 14 years of experience across cybersecurity, IT, and finance. She currently serves as Cyber Compliance Lead Auditor for Rockwell Automation, a Fortune 500 company operating within the nation’s critical infrastructure. She was named a “40 Under 40” award recipient by Oakland County Government, in recognition of her exceptional leadership, innovation, and community service, highlighting her contributions to driving positive change locally and beyond.

    Enida holds a Bachelor of Laws degree and a master’s in public administration, combining legal and policy expertise with technical acumen. She has further specialized in cybersecurity through a master’s certificate in Enterprise Cybersecurity Leadership, a Certificate in Exercising Leadership from HarvardX, and professional certifications in ISO standards and artificial intelligence. Certified Information Security Manager (CISM), demonstrating expertise in information security governance, risk management, and incident response.

    A respected thought leader, she has served as a judge for high-impact industry events including the 2024 SC Media Cybersecurity Awards and the CyberShark Pitch Competition, recognizing excellence and innovation across the cybersecurity landscape. Beyond her professional achievements, she is deeply committed to giving back—volunteering as a mentor to women in cybersecurity and actively empowering the next generation of leaders. As the Employment Director for ISSA Motor City, she leads initiatives focused on job placement within the information security community, building strong partnerships with employers to create sustainable employment pathways for members. Through strategic planning and hands-on support, she aligns candidates with opportunities that fit their skills, career goals, and long-term growth potential.

    This dedication is further reflected in her role as a NICE | NIST Cybersecurity Career Ambassador, helping to advance national efforts in cybersecurity education, training, and workforce development.

  • speaker photo
    Chris Montgomery
    Solutions Architect, Proofpoint

    Chris Montgomery is a Solutions Architect at Proofpoint where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he can be found consulting with security practitioners and OEM suppliers focused on utilizing threat intelligence to improve cyber security situational awareness and the overall risk posture of an organization. Chris is a CISSP and holds several other industry certifications.

  • speaker photo
    Ryan Witt
    VP, Industry Solutions, Proofpoint

    Ryan Witt is a recognized Healthcare Cyber Security Executive and a regular speaker at HIMSS, CHIME, AEHIS, etc. Currently, Ryan is Proofpoint's VP, Industry Solutions and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader for Fortinet and Juniper Networks where he also was the Chair for their respective Healthcare Customer Advisory Boards. Ryan was a contributor to the 2013 WEDI Report, a former Co-Chair of WEDI's Privacy & Security Workgroup and has been elected to the WEDI Board of Directors. Ryan was also elected to the Association for Executives in Health Information Security (AEHIS) Advisory Board. A graduate of San Jose State University, Ryan has spent much of his professional life in Europe, but he and his family now live in Silicon Valley.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Emmanuel Nwajiaku
    GRC Officer, Georgia Tech Research Institute

    Emmanuel Nwajiaku is a GRC Officer at Georgia Tech Research Institute and an Instructor. He holds CISSP, Security+, and Network+ certifications, along with a Secret clearance. Emmanuel focuses on AI-enhanced security policies and human-centered defense strategies. He has led awareness programs that reduced phishing click rates by 30% and teaches these approaches in both corporate and academic settings.

  • speaker photo
    Larry Wilson, CISSP, CISA
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Chuck Brooks
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty

    Chuck Brooks is a leading evangelist for cybersecurity in both the public and private sectors. He is one of the original “plank holders” at the U.S. Department of Homeland Security, worked on Capitol Hill, taught homeland security at Johns Hopkins University, and has advised several organizations including the Bill & Melinda Gates Foundation and The Cyber Resilience Institute. He is a member of the AFCEA Cybersecurity Committee and serves as Chairman of CompTIA’s New and Emerging Technologies.

    Chuck has been a featured speaker at numerous events and conferences and has written dozens of articles on cyber tech and policy in publications such as Forbes, Huffington Post, The Hill, Federal Times, IT Security Planet, Bizcatalyst360, NextGov, Alien Vault, Gov Tech, Government Security News, and many others. He is a pioneer in social media with a global following and has brought significant attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter, Facebook, FedScoop, and other social media. He also owns and operates several high profile groups on LinkedIn active in cybersecurity and homeland security discussions.

  • speaker photo
    Sarath Shanker
    Doctoral Researcher, Computer Science, Oakland University

    Sarath Shanker is a Ph.D. candidate in Computer Science at Oakland University, specializing in cybersecurity and artificial intelligence. He holds a Master’s degree from Northeastern University, Boston, and has more than 10 years of industry experience in software development, cloud infrastructure, and AI systems. His research focuses on adversarial threats in privacy-preserving environments, darknet infrastructure security, and the ethical use of AI in cyber defense.

  • speaker photo
    Russell Dowdell
    Sr. Director of Product Management for Privileged Access, Imprivata
  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Krista Arndt
    Associate CISO, St. Luke's University Health Network

    Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.

    Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

    When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.

  • speaker photo
    Doug Cavit
    CISO, Snohomish County, Washington

    Doug Cavit has been involved in cybersecurity for 30 years as CIO of McAfee and Chief Security Strategist at Microsoft, as well as CISO for two tech startups working on automated cybersecurity in the cloud. He was a major contributor to Microsoft adding anti-malware and several versions of Windows. He has been involved in setting security standards for the financial services and utility industries as well as the ISO process for secure software development. He has helped the Global Fortune 1000 and governments around the world on security and is a noted speaker in the security industry. Doug was a finalist for an Orbie award for CISO of the year in 2025. He holds multiple patents for IT infrastructure. Currently, he is CISO for Snohomish County in Washington State. In addition, he is a volunteer board member for a local non-profit that provides computers to the disadvantaged.

  • speaker photo
    Bruce Coffing
    CISO, City of Chicago, Department of Technology & Innovation

    Bruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank of America and was a Senior Manager at consulting firm Accenture. Mr. Coffing holds the Certified Information Systems Security Professional (CISSP) certification.

  • speaker photo
    Iain Sloan
    CISO, Washington State Liquor and Cannabis Board

    Iain Sloan is an accomplished cybersecurity leader with more than 40 years of experience in information technology and security across both public and private sectors in the UK, Texas, and Washington State. As Chief Information Security Officer for the Washington State Liquor and Cannabis Board, he is responsible for safeguarding critical infrastructure, ensuring regulatory compliance, and driving strategic initiatives that enhance the agency’s security posture.

    Throughout his career, Iain has led enterprise programs, implemented risk management frameworks, and fostered cross-functional collaboration to address evolving cyber threats. His deep technical expertise, combined with a commitment to operational excellence and public service, makes him a respected voice in the cybersecurity community.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Adam Bush
    Managing Director, Schellman
  • speaker photo
    Toby Bussa
    Director, Product Marketing, Huntress

    Toby Bussa is a Director of Product Marketing at Huntress. He has over 20 years of experience in cybersecurity. He most recently was VP of Product Marketing at ThreatConnect. Prior to that he was a VP Analyst at Gartner where he covered security operations. He previously led IT security operations, data protection, security architecture and engineering, and 3rd party risk management for a FTSE100 enterprise, and the EMEA SOC threat detection team for a global MSSP.

  • speaker photo
    Michael Tigges
    Sr. Hunt & Response Analyst, Huntress

    Transforming curiosity into cyber defense, one line of code at a time.

    Michael Tigges is a Senior Security Operations Analyst at Huntress, where he puts his passion for reverse engineering, threat detection, and partner support into practice. His interest in cybersecurity took off when he began learning Python and dissecting malware lurking in open-source software channels. Today, he holds a B.S. in Cybersecurity from the SANS Technology Institute and a host of certifications, including GPEN, GCFE, GCFA, GCIA, and GCIH.

    Before joining Huntress, Michael worked in financial risk analysis for enterprise banking and served eight years of Active Duty in the U.S. Air Force munitions career field, bringing a unique blend of analytical skill, discipline, and operational insight to his role. What he loves most about Huntress is the open atmosphere: “There’s always something interesting going on to learn from,” he says, whether it’s threat intel specialists forming a cohesive threat picture, reverse engineers dissecting malware, or account managers supporting valued partners.

    What’s your favorite cybersecurity tip, Michael? “Never click promotional email links; figure out where they go and navigate yourself. When typing out that domain, you may find it doesn't say what you think it does.”

    Outside of work, Michael invests his time in gaming, software engineering, and exploring open-source security projects. He also shares his insights on his personal blog (sudorem.dev) and on X: @sudo_Rem.