Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, November 13, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
11:00 am[Opening Keynote] When Policy Isn't Enough: Enforcing Zero Trust Before It's Too LateCTO, ImprivataRegistration Level:
Open Sessions
11:00 am - 11:45 amA well-crafted access policy might look airtight on paper—but reality tells a different story. When security measures slow productivity, users find workarounds, unintentionally opening doors to outside threats.
In this session, Joel Burleson-Davis, CTO of Imprivata, shares how to bridge the gap between policy and practice. Learn how to design policies that users will actually follow, enforce access seamlessly, and detect anomalous behavior before small slips become major breaches.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmBehavioral Threat Intelligence: Profiling the Human AdversaryCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:
Open Sessions
12:00 pm - 12:45 pmTo stop an adversary, you must first understand them. This session moves beyond traditional cyber defense to explore the human element driving attacks on critical infrastructure. In “Behavioral Threat Intelligence,” we dissect the “who” and “why” behind today’s most significant threats—from nation-state sabotage to criminal campaigns. By examining the psychological drivers, cultural biases, and cognitive patterns of attackers, we reveal how to anticipate their next move. You will leave with practical strategies for integrating behavioral profiling with technical intelligence, transforming your ability to predict, attribute, and neutralize threats to the systems we all depend on.12:00 pmThe Global AI Dilemma: How the EU and U.S. Are Balancing Innovation and RegulationCyber Compliance Lead Auditor, Rockwell AutomationRegistration Level:
Open Sessions
12:00 pm - 12:45 pmArtificial Intelligence is impacting our work, and every aspect of our lives, creating both possibilities and challenges. The European Union has enacted broad, mandatory regulations on AI. The United States is focusing on innovation and choosing a different approach by allowing states to decide for themselves. In this session, we explore these two distinct strategies, with a focus on the critical need to balance the protection of human rights and ethical standards, with support for technological advancement.12:00 pmAI-Augmented Threats in Higher Education: Who's Being Targeted and WhySolutions Architect, ProofpointVP, Industry Solutions, ProofpointRegistration Level:
Open Sessions
12:00 pm - 12:45 pmAI-powered cyber threats are rising in higher education, with targeted phishing and deepfake attacks becoming more sophisticated. As the attack surface expands, colleges and universities must focus on securing workforce identity—often the weakest link. A layered, human-centric defense is key to protecting faculty, students, and staff.
Join Proofpoint’s Ryan Witt and Chris Montgomery for a discussion on the latest threat intelligence and strategies to help institutions better understand and defend against today’s advanced cyberattacks.
We will explore:
- Emerging AI-enabled attack trends
- Threat insights into which departments and roles are most at risk
- Actionable strategies to proactively defend against these advanced AI attacks
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmYou Are Not a CISO, You Are a 'CO IS'Cybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
1:00 pm - 1:45 pmThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
1:00 pmThe Psychology of Phishing: Designing Human‑Centered Awareness ProgramsGRC Officer, Georgia Tech Research InstituteRegistration Level:
Open Sessions
1:00 pm - 1:45 pmPhishing is still the most common attack method because it taps into natural human biases. In this session, we’ll break down the key psychological triggers—like authority, urgency, and social proof—that make these attacks work.
You’ll learn how to build awareness programs that actually connect with employees by focusing on what motivates real behavior. We’ll walk through a practical framework for designing empathy-based simulations, tracking behavior change over time, and improving your training based on what works.
You’ll walk away with a proven, psychology-based blueprint and ready-to-use templates to build phishing awareness programs that cut click rates by over 30% in just three months.
1:00 pmThe Essentials of Building a Foundational Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
Open Sessions
1:00 pm - 1:45 pmArtificial intelligence, including Generative AI and Large Language Models (LLMs), is rapidly transforming business and technology. As organizations adopt AI, new and evolving cybersecurity risks emerge. This accelerated session provides cybersecurity practitioners with the essential knowledge and actions needed to immediately begin safeguarding AI systems.
The session will focus on three critical, actionable areas:
- Understanding the Core AI Attack Surface and Key Threats
This module provides a rapid-fire overview of the AI landscape, defining essential terms like Generative AI, LLMs, and AI Agents. It will quickly pivot to identifying the most critical AI threats and vulnerabilities, focusing on Adversarial AI and the immediate takeaways from the OWASP Top 10 for LLM Applications. - Essential AI Security Controls and Frameworks
This section will present a concise, high-level overview of practical, industry-leading security frameworks applicable to AI. The focus will be on the core principles and immediate actions derived from resources like the NIST SP 800-218A Secure Software Development Practices for Generative AI and the Google Secure AI Framework (SAIF). Attendees will learn what controls to prioritize in their current cybersecurity programs. - Integrating AI Risk and Governance into Existing Programs
We will discuss the fundamental steps for incorporating AI into your organization’s existing Risk Management, Compliance, and Governance structure. This includes a look at the NIST AI Risk Management Framework (RMF) and an overview of emerging global regulations (e.g., the EU AI Act) to help organizations prepare for AI audits and policy development.
From this session, attendees will gain a foundational understanding of the AI-driven attack surface and immediate, actionable steps to integrate AI security, risk management, and governance into their current cybersecurity strategy.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmThe Cyber Frontier: Navigating Security Challenges Posed by AI, Quantum Computing, and Emerging TechnologiesCybersecurity influencer, author, presidential appointee, and Georgetown University cyber facultyRegistration Level:
Open Sessions
2:00 pm - 2:45 pmThis presentation examines the critical cybersecurity challenges and opportunities presented by the rapid advancement of emerging technologies, which are advancing faster than society’s ability to absorb and understand them.
The first core focus is on Artificial Intelligence (AI), which acts as a double-edged sword in the security landscape. AI is a powerful enabler for defense, capable of mitigating threats through automated process monitoring, predictive analytics, malware identification, and autonomous patching. Conversely, cyber attackers are leveraging offensive AI to create sophisticated, self-mutating (polymorphic) malware that can learn from failed attacks and self-propagate by exploiting system vulnerabilities.
Next, the discussion addresses Quantum Computing, and the impending risk of “Q-Day”. Large-scale quantum computers, once operational, will be able to use Shor’s algorithm to break all current public key cryptosystems, including RSA, Diffie-Hellman, and Elliptic Curve Cryptography. This mandates an urgent global transition to new, stronger post-quantum algorithms (cryptosystems).
Finally, the presentation highlights Emerging Sector Risks, specifically focusing on the cyber vulnerabilities of commercial space and satellite systems, which are increasingly seen as critical infrastructure. Weaknesses often stem from the use of long-range telemetry with open telecom network security protocols, which offer numerous inroads for attackers.
To secure the future, strategies must be proactive, requiring substantial research investment in both AI and cybersecurity9999. Essential principles include adopting a Zero Trust architecture, implementing Security by Design, and preparing for the necessary shift to Post-Quantum Cryptography.
2:00 pmBreaking Protocol: Email Subversion in Dark-Net and AI RemediationDoctoral Researcher, Computer Science, Oakland UniversityRegistration Level:
Open Sessions
2:00 pm - 2:45 pmThe dark web hosts numerous encrypted email providers marketed as privacy-centric platforms. However, many of these services are increasingly subverted by malicious actors—ranging from cybercriminals to extremist groups—who exploit weak authentication protocols, flawed onion routing implementations, and unmonitored registration pipelines. This study identifies and demonstrates key vulnerabilities in these anonymous email infrastructures, including account hijacking, metadata leakage, and bot-based mass account creation. We showcase real-world exploitation tactics used to bypass safeguards and embed persistent backdoors.
2:00 pmThreat Landscape 2025: Navigating Identity, Scams, and Resilience in Government & Higher EducationSr. Director of Product Management for Privileged Access, ImprivataExecutive Director, National Cybersecurity AllianceRegistration Level:
Open Sessions
2:00 pm - 2:45 pmGovernment agencies and higher education institutions face a unique and relentless cyber offensive, balancing mission-critical services with resource constraints and transient user populations. This expert panel dissects the threat landscape, focusing on the vectors that exploit people and trust.
Lisa Plaggemier of the National Cybersecurity Alliance will reveal why college students are prime targets for sophisticated scams and how to build effective security behaviors. Russell Dowdell of Imprivata will address the escalating chaos of Identity Governance, focusing on third-party access, cloud sprawl, and the critical need to secure non-human identities. Join these experts for a discussion on actionable strategies to boost operational resilience and navigate the complex, often underfunded, journey toward Zero Trust in the public sector.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pm[Panel] Critical Data, Critical Hits: Cybersecurity Leaders on the Front LinesAssociate CISO, St. Luke's University Health NetworkCISO, Snohomish County, WashingtonCISO, City of Chicago, Department of Technology & InnovationCISO, Washington State Liquor and Cannabis BoardRegistration Level:
Open Sessions
3:00 pm - 3:45 pmWhat does it take to lead cybersecurity for a city or county, a multi-billion dollar healthcare network, or a state’s regulatory body for a new industry? This panel cuts straight to the reality of protecting critical public services and high-value data from relentless attacks. The conversation will focus on the hard-won lessons and tackle the immediate, tactical issues like securing an explosion of remote work devices, managing legacy technology, and fighting the growing sophistication of social engineering. Learn how these leaders prioritize risk, build resilient systems on public-sector budgets, and prepare their organizations for the inevitable “critical hit.”3:00 pmCyber Intelligence Briefing: Defending Public Trust and Civic InfrastructureCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:
Open Sessions
3:00 pm - 3:45 pmGovernment agencies at every level are on the front lines of a persistent cyber conflict, entrusted with safeguarding citizen data, delivering essential services, and upholding public trust. This presentation delivers a focused intelligence briefing on the threats facing the public sector. We will dissect recent attacks on civic infrastructure, analyze the tradecraft of nation-states engaged in cyber espionage, and map the emerging trends in criminal campaigns targeting government entities. This session is designed for public sector leaders and technical staff, providing actionable intelligence to harden defenses, ensure the continuity of government, and protect the sensitive data that powers our society.3:00 pmEnhancing Security, Easing Compliance: PCI DSS for Multi-Payment Channel OrganizationsManaging Director, SchellmanRegistration Level:
Open Sessions
3:00 pm - 3:45 pmNavigating PCI DSS compliance can be daunting for multi-payment channel merchants and service providers handling diverse transaction environments. This presentation explores practical strategies to reduce compliance burden while bolstering security. Attendees will learn how simple process changes, such as tokenization and point-to-point encryption, can minimize sensitive data exposure. We’ll also examine the benefits of outsourcing specific PCI DSS responsibilities to trusted third-party providers, enabling organizations to focus on core operations without compromising security. Drawing on real-world examples, the session will highlight how these approaches streamline compliance efforts, reduce costs, and enhance protection across online, in-store, and mobile payment channels. Ideal for merchants and service providers, this talk offers actionable insights to achieve PCI DSS compliance efficiently.3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] Wrecking Ransomware with Defense-in-DepthDirector, Product Marketing, HuntressSr. Hunt & Response Analyst, HuntressRegistration Level:
Open Sessions
4:00 pm - 4:45 pmRansomware is a massive and persistent problem, and ALL businesses are targets. But defending against these attacks is sometimes treated like an endpoint security issue, giving ransomware groups and threat actors like initial access brokers a major advantage over businesses and organizations working to defend themselves.
In this presentation, we teach you how to defend against ransomware attacks with a “defense-in-depth” approach—from humans to identities to infrastructure to endpoints—to give you the upper hand. We’ll dive into real-life ransomware events the Huntress SOC and threat hunting team has dealt with, so you can see how a defense-in-depth approach wrecks attackers.
- HuntressBooth:
Protect Your Endpoints, Identities, Logs, and Employees.
The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.
By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most under-resourced businesses defend against today’s cyberthreats.
As long as hackers keep hacking, we keep hunting.
- Imprivata, Inc.Booth:
Imprivata delivers access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata’s platform of innovative, interoperable access management and privileged access security solutions enable organizations to fully manage and secure all enterprise and third-party identities to facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership.
- ProofpointBooth:
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
Joel Burleson-DavisCTO, ImprivataJoel Burleson-Davis is the Chief Technology Officer at Imprivata where he’s responsible for building, delivering, and evolving the suite of Imprivata’s cybersecurity products that include Privileged Access Management, Privacy Monitoring, and Identity Governance solutions.
Prior to joining Imprivata, Joel was CTO at SecureLink, the leader in critical access management for organizations in need of advanced solutions to secure access to their most valuable assets, including networks, systems, and data. While at SecureLink, Joel was responsible for the overall technology and operational strategy and execution including direction and oversight for Product Development, Quality Assurance, IT and Cybersecurity Operations, Compliance, and Customer Success.
Before SecureLink, Joel held Systems Engineering, IT Consulting, and Instructor positions while serving as one of the founding members of The Linux Foundation certification committee, a global committee of key Linux subject matter experts. Joel earned a Master of Liberal Arts degree in Systems Theory and Technology from St. Edward’s University, and a Bachelor of Arts degree in Philosophy and Religious Studies from Texas Lutheran University.
Fun Facts: When he’s not helping customers, Joel likes to cook. In particular, he’s a bread enthusiast, from babka and brioche to Detroit-style pizza to rustic sourdough. He also enjoys adventuring with his wife, two daughters, and their bulldog.
Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiCameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).
Enida MetajCyber Compliance Lead Auditor, Rockwell AutomationEnida Metaj is an award-winning cybersecurity leader with more than 14 years of experience across cybersecurity, IT, and finance. She currently serves as Cyber Compliance Lead Auditor for Rockwell Automation, a Fortune 500 company operating within the nation’s critical infrastructure. She was named a “40 Under 40” award recipient by Oakland County Government, in recognition of her exceptional leadership, innovation, and community service, highlighting her contributions to driving positive change locally and beyond.
Enida holds a Bachelor of Laws degree and a master’s in public administration, combining legal and policy expertise with technical acumen. She has further specialized in cybersecurity through a master’s certificate in Enterprise Cybersecurity Leadership, a Certificate in Exercising Leadership from HarvardX, and professional certifications in ISO standards and artificial intelligence. Certified Information Security Manager (CISM), demonstrating expertise in information security governance, risk management, and incident response.
A respected thought leader, she has served as a judge for high-impact industry events including the 2024 SC Media Cybersecurity Awards and the CyberShark Pitch Competition, recognizing excellence and innovation across the cybersecurity landscape. Beyond her professional achievements, she is deeply committed to giving back—volunteering as a mentor to women in cybersecurity and actively empowering the next generation of leaders. As the Employment Director for ISSA Motor City, she leads initiatives focused on job placement within the information security community, building strong partnerships with employers to create sustainable employment pathways for members. Through strategic planning and hands-on support, she aligns candidates with opportunities that fit their skills, career goals, and long-term growth potential.
This dedication is further reflected in her role as a NICE | NIST Cybersecurity Career Ambassador, helping to advance national efforts in cybersecurity education, training, and workforce development.
Chris MontgomerySolutions Architect, ProofpointChris Montgomery is a Solutions Architect at Proofpoint where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he can be found consulting with security practitioners and OEM suppliers focused on utilizing threat intelligence to improve cyber security situational awareness and the overall risk posture of an organization. Chris is a CISSP and holds several other industry certifications.
Ryan WittVP, Industry Solutions, ProofpointRyan Witt is a recognized Healthcare Cyber Security Executive and a regular speaker at HIMSS, CHIME, AEHIS, etc. Currently, Ryan is Proofpoint's VP, Industry Solutions and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader for Fortinet and Juniper Networks where he also was the Chair for their respective Healthcare Customer Advisory Boards. Ryan was a contributor to the 2013 WEDI Report, a former Co-Chair of WEDI's Privacy & Security Workgroup and has been elected to the WEDI Board of Directors. Ryan was also elected to the Association for Executives in Health Information Security (AEHIS) Advisory Board. A graduate of San Jose State University, Ryan has spent much of his professional life in Europe, but he and his family now live in Silicon Valley.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Emmanuel NwajiakuGRC Officer, Georgia Tech Research InstituteEmmanuel Nwajiaku is a GRC Officer at Georgia Tech Research Institute and an Instructor. He holds CISSP, Security+, and Network+ certifications, along with a Secret clearance. Emmanuel focuses on AI-enhanced security policies and human-centered defense strategies. He has led awareness programs that reduced phishing click rates by 30% and teaches these approaches in both corporate and academic settings.
Larry Wilson, CISSP, CISASr. Cybersecurity Consultant, Wilson CyberLarry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
Chuck BrooksCybersecurity influencer, author, presidential appointee, and Georgetown University cyber facultyChuck Brooks is a leading evangelist for cybersecurity in both the public and private sectors. He is one of the original “plank holders” at the U.S. Department of Homeland Security, worked on Capitol Hill, taught homeland security at Johns Hopkins University, and has advised several organizations including the Bill & Melinda Gates Foundation and The Cyber Resilience Institute. He is a member of the AFCEA Cybersecurity Committee and serves as Chairman of CompTIA’s New and Emerging Technologies.
Chuck has been a featured speaker at numerous events and conferences and has written dozens of articles on cyber tech and policy in publications such as Forbes, Huffington Post, The Hill, Federal Times, IT Security Planet, Bizcatalyst360, NextGov, Alien Vault, Gov Tech, Government Security News, and many others. He is a pioneer in social media with a global following and has brought significant attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter, Facebook, FedScoop, and other social media. He also owns and operates several high profile groups on LinkedIn active in cybersecurity and homeland security discussions.
Sarath ShankerDoctoral Researcher, Computer Science, Oakland UniversitySarath Shanker is a Ph.D. candidate in Computer Science at Oakland University, specializing in cybersecurity and artificial intelligence. He holds a Master’s degree from Northeastern University, Boston, and has more than 10 years of industry experience in software development, cloud infrastructure, and AI systems. His research focuses on adversarial threats in privacy-preserving environments, darknet infrastructure security, and the ethical use of AI in cyber defense.
Russell DowdellSr. Director of Product Management for Privileged Access, Imprivata
Lisa PlaggemierExecutive Director, National Cybersecurity AllianceLisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
Krista ArndtAssociate CISO, St. Luke's University Health NetworkKrista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.
Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.
When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.
Doug CavitCISO, Snohomish County, WashingtonDoug Cavit has been involved in cybersecurity for 30 years as CIO of McAfee and Chief Security Strategist at Microsoft, as well as CISO for two tech startups working on automated cybersecurity in the cloud. He was a major contributor to Microsoft adding anti-malware and several versions of Windows. He has been involved in setting security standards for the financial services and utility industries as well as the ISO process for secure software development. He has helped the Global Fortune 1000 and governments around the world on security and is a noted speaker in the security industry. Doug was a finalist for an Orbie award for CISO of the year in 2025. He holds multiple patents for IT infrastructure. Currently, he is CISO for Snohomish County in Washington State. In addition, he is a volunteer board member for a local non-profit that provides computers to the disadvantaged.
Bruce CoffingCISO, City of Chicago, Department of Technology & InnovationBruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank of America and was a Senior Manager at consulting firm Accenture. Mr. Coffing holds the Certified Information Systems Security Professional (CISSP) certification.
Iain SloanCISO, Washington State Liquor and Cannabis BoardIain Sloan is an accomplished cybersecurity leader with more than 40 years of experience in information technology and security across both public and private sectors in the UK, Texas, and Washington State. As Chief Information Security Officer for the Washington State Liquor and Cannabis Board, he is responsible for safeguarding critical infrastructure, ensuring regulatory compliance, and driving strategic initiatives that enhance the agency’s security posture.
Throughout his career, Iain has led enterprise programs, implemented risk management frameworks, and fostered cross-functional collaboration to address evolving cyber threats. His deep technical expertise, combined with a commitment to operational excellence and public service, makes him a respected voice in the cybersecurity community.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.
Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.
Adam BushManaging Director, Schellman
Toby BussaDirector, Product Marketing, HuntressToby Bussa is a Director of Product Marketing at Huntress. He has over 20 years of experience in cybersecurity. He most recently was VP of Product Marketing at ThreatConnect. Prior to that he was a VP Analyst at Gartner where he covered security operations. He previously led IT security operations, data protection, security architecture and engineering, and 3rd party risk management for a FTSE100 enterprise, and the EMEA SOC threat detection team for a global MSSP.
Michael TiggesSr. Hunt & Response Analyst, HuntressTransforming curiosity into cyber defense, one line of code at a time.
Michael Tigges is a Senior Security Operations Analyst at Huntress, where he puts his passion for reverse engineering, threat detection, and partner support into practice. His interest in cybersecurity took off when he began learning Python and dissecting malware lurking in open-source software channels. Today, he holds a B.S. in Cybersecurity from the SANS Technology Institute and a host of certifications, including GPEN, GCFE, GCFA, GCIA, and GCIH.
Before joining Huntress, Michael worked in financial risk analysis for enterprise banking and served eight years of Active Duty in the U.S. Air Force munitions career field, bringing a unique blend of analytical skill, discipline, and operational insight to his role. What he loves most about Huntress is the open atmosphere: “There’s always something interesting going on to learn from,” he says, whether it’s threat intel specialists forming a cohesive threat picture, reverse engineers dissecting malware, or account managers supporting valued partners.
What’s your favorite cybersecurity tip, Michael? “Never click promotional email links; figure out where they go and navigate yourself. When typing out that domain, you may find it doesn't say what you think it does.”
Outside of work, Michael invests his time in gaming, software engineering, and exploring open-source security projects. He also shares his insights on his personal blog (sudorem.dev) and on X: @sudo_Rem.