- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Thursday, April 4, 20247:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Navigating Burnout and Setting Boundaries in CybersecurityRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amLocation / Room: Live Oak BJoin us for a candid dialogue on fostering well-being, promoting work-life balance, and building mental resilience within cybersecurity teams. Together, let’s strengthen the guardians of our digital frontiers for a healthier and more sustainable future.8:00 amWiCyS Houston Affiliate Meeting [Open to all attendees]Let’s Discuss the 'B' Word for Women in CybersecurityCISO, Advisory Board Member; Founder, Cyber Point AdvisoryRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: PecanNo, it’s not the ‘B’ word you are thinking of.
8:00 amISSA South Texas Chapter MeetingOpen to all attendeesVice President, ISSA South TexasRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: ElmCome join chapter members to network, learn about ISSA South Texas, and meet your local chapter board members.8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Secure by Design: A Cyber Symphony of Unsung HeroesChief of Staff, Itegriti; CISO & Fellow Emeritus, SchlumbergerChief Security Architect, ChevronVP, Global Information & Product Security, PindropCISO, Advisory Board Member; Founder, Cyber Point AdvisoryRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIn this opening keynote, we’ll shine a spotlight on the unsung heroes of the cyber realm and their indispensable role in orchestrating a resilient defense against digital threats.
Join us as we unveil the tales of leaders who have embraced the mission to secure our digital frontiers. Through a captivating narrative that seamlessly blends leadership prowess with superhero-esque resilience, we’ll showcase how these unsung heroes infuse security into the very core of their organizations.
Get ready to be inspired by stories of triumph and strategies that mirror the superhero ethos, creating a cybersecurity landscape that is not just secure but fortified by the strength of its guardians. Let’s celebrate the unsung heroes of cybersecurity and set the stage for a day dedicated to innovation, collaboration, and a future that is undeniably “Secure by Design.”
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amEmpowering Organizations: Educating End Users, Executives, and Boards on Cyber Risk MitigationCISO & CIO, Quantum Materials Corp.Registration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: Elm10:15 amCyberRisk Jenga: Balancing AI, Law, and TechnologyCyber Liability & Data Privacy Attorney, Angelo Law Firm PLLCAttorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon LawAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & ForsterRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: Pecan“CyberRisk Jenga: Balancing AI, Law, and Technology” explores the precarious intersection of artificial intelligence, legal frameworks, and technological advancements. This session delves into strategies for managing the intricate risks emerging from AI integration in cyber systems. Attendees will gain insights into harmonizing technological innovation with legal compliance in an increasingly AI-driven world.
10:15 amMind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-PatchVP, Cyber Risk, Skybox SecurityRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: Live Oak AToo many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to the importance of the asset or its exposure to potential attack across the network.
To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.
In this session, you will learn:
- How the visibility of your assets, networks, business, and security data impacts vulnerability risk.
- What scanners miss in discovery and prioritization, and how to fill in the gaps.
- How to reduce the scan-and-patch lag from weeks to hours.
This session explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amUsing People, Process, and Technology to Build a World-Class SOCCISO, State of North DakotaRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: ElmIn this session, Michael will discuss People, Process, and Technology and how he has used this methodology for process improvement to SOC operations. Michael will provide examples of the wins he has experienced and share that along with the metrics to measure your progress.
11:10 amBeyond the Breach: Navigating the Emotional Cyber Storm in OrganizationsInfraGard Houston Maritime Cross Sector ChiefRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: Live Oak AIn this presentation, we explore the psychological aftermath of cyber attacks on organizations, highlighting the spectrum of mental health challenges faced by employees, from stress and anxiety to PTSD and depression. The discussion emphasizes the importance of addressing the strain on IT staff, the erosion of trust, the persistent fear of future attacks, and the impact on personal identity and self-esteem. By advocating for a holistic approach to cyber security that includes psychological support and preventive strategies, the presentation underscores the need for resilience-building measures and a blame-free culture to help organizations and their workforce navigate the complex emotional landscape post-attack, ensuring both technological and psychological recovery.
11:10 am[Panel] Unveiling the Threat Landscape and Unmasking Digital VillainsChief Operating Officer, EnvisionVice President, SavvyChief Innovation Officer, SyxsenseDirector of Information Security, Commercial Real Estate IndustryRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: PecanIn the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.
Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.
Our panel provides a comprehensive overview of the current threat landscape.
12:00 pm[Lunch Keynote] Securing Our Digital Frontiers: A Legal Perspective on Nation-State Cyber ThreatsUnited States Attorney, Southern District of Texas, DOJRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterDelve deep into the world of advanced cyber tools utilized by China and other nation-state actors and gain a comprehensive understanding of the evolving tactics, techniques, and procedures employed in their pursuit. This session offers a nuanced exploration of the current threat landscape, using real-world examples and case studies to illustrate the potential impact on the United States.
Explore the legal dimensions of countering cyber threats as we dive into the intricacies of law enforcement’s role and the challenges posed by prosecuting cybercriminals across international borders. Learn about collaborative initiatives aimed at strengthening national cybersecurity defenses and fortifying critical infrastructure against emerging threats.
This is your opportunity to be well-informed, engaged, and empowered in the ongoing battle against cyber threats posed by nation-state actors. Discover how legal frameworks and collaborative efforts are shaping the defense strategies that protect our digital frontiers.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmSelling Security Awareness to Your EmployeesVP, Information Security, First Community Credit UnionRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: Live Oak AThis presentation is not a “how-to” guide on developing an effective security awareness program, but an exploration of ideas rooted in marketing concepts security professionals can utilize to create or enhance their own programs. Topics will range through a variety of concepts but some of the highlights will be the need for “branding” an organization’s program to establish an identity with the employees, conveying security operations role within the organization, ways to improve your employee’s participation in the security awareness program, what’s in the program for your employees, and useful metrics to measure participation in your program. The presentation will outline ways security practitioners can convey their security messages to employees in unique and fun ways that will excite and improve employee involvement with the program utilizing marketing concepts.
1:15 pmNavigating the Digital Abyss: Unmasking the True Cost of Ransom vs. Cyber InsuranceVP, Cyber Practice Leader, Cadence InsuranceRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: ElmThis session aims to explore the advantages of cyber insurance and its increasing relevance in today’s rapidly evolving technological landscape. Cybercrime has become one of the most significant risks faced by businesses globally, with the cost of cyber-attacks and data breaches escalating year on year. The advent of ransomware has only heightened this threat, with statistics revealing that ransomware attacks increased by 485% in 2020 alone.
The cost of ransomware is also rising, with some attacks costing in the region of tens of millions of dollars. Cyber insurance is an excellent form of both risk management and financial risk transfer by providing businesses with an essential safety net in the event of a cyber-attack, offering financial support and assistance to cover the costs incurred by the attack through business interruption, data recovery, third-party liability, and reputational damage costs.
Additionally, cyber insurance providers often provide additional risk management services such as non-intrusive vulnerability assessments, tabletops, and incident response planning to help businesses identify potential risks and implement preventative measures to reduce the likelihood of a cyber-attack. With the escalating cost and frequency of cyber-attacks, having cyber insurance is becoming an essential component of any effective cybersecurity strategy- it provides businesses with financial protection and additional risk management services to help minimize the impact of a cyber-attack.
As such, it is crucial that businesses give serious consideration to the advantages of cyber insurance and explore their options for this form of protection.
In this session, we’ll delve into the complex interplay between cyber insurance policies and the rising threat of ransomware attacks. Join us as we explore the nuances, dispel insurance myths, and uncover strategies to safeguard organizations in today’s ever-evolving digital landscape.
Key Points:
- Advantages and disadvantages of having cyber insurance
- What does cyber insurance cover vs. not cover?
- Increasing cost of ransomware and what that means for companies
- Detailing how cyber insurance is a great form of holistic enterprise risk management and financial risk transfer.
1:15 pm[Panel] Beyond the Shadows: Anticipating Tomorrow's Cyber ThreatsCo-Founder & CEO, Zafran SecurityDirector, Practice Advisor, Rapid7Principal Solutions Architect, ThalesDirector, Global Cybersecurity Program, University of St. ThomasRegistration Level:- Open Sessions
1:15 pm - 2:00 pmLocation / Room: PecanIn the dynamic realm of cybersecurity, the battle between defenders and digital villains is an ongoing saga. This forward-looking session will explore the evolution of cyber threats, forecasting the next wave of challenges that organizations and individuals may face. We aim to unmask the upcoming generation of digital villains, examining their sophisticated tactics and exploiting vulnerabilities that may become prevalent in the future.
Our distinguished panel of cybersecurity experts will dissect the motivations driving these threats, from the ever-adapting strategies of profit-driven cybercriminals to the evolving techniques employed by state-sponsored actors wielding cyberweapons. As we peer into the future, we will also address the role of emerging technologies in reshaping the threat landscape, providing insights that empower organizations to proactively defend against tomorrow’s cyber challenges.
Join us in this exploration of the unseen, as we strive to anticipate and understand the threats that lie beyond the shadows of the current cybersecurity landscape.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmSocial Engineering: Training the Human FirewallTeam Leader of Information Security, GarminRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: ElmPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
2:10 pmAutomated Application Security Posture Management at SLBCybersecurity Architect, Schlumberger (SLB)Registration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: PecanLearn how automated application security enables product teams in SLB to continuously deliver secure products to clients. As product teams release every few hours or days, security compliance needs to be automated as well. This presentation will showcase the DevSecOps process used at SLB to automate security testing and security compliance. I will elaborate on the reporting requirements that enable product and security teams to review existing risks, vulnerabilities, and possible mitigations. I will elaborate on the application security risk matrix which can be used in agile development to secure continuous releases.
2:10 pmLoaves and Phishes: Establishing Purpose in the Nebulous and Evolving Terrain of CybersecurityCommissioner, City of Austin's Community Technology and Telecommunications CommissionRegistration Level:- Open Sessions
2:10 pm - 2:55 pmLocation / Room: Live Oak AAfter spending time in the Army, Gabriel began to transition into the cybersecurity sector, safeguarding digital infrastructures against evolving threats. He felt a calling to serve his country in a more direct and tangible manner. The decision to transition was not easy, as it required leaving behind a guaranteed path for the unknown challenges of civilian life. However, he was driven by a desire to apply his expertise in a different context, one where the stakes were even higher, and the impact more immediate.
During this journey, he encountered various challenges, from adapting to the rigorous physical training regimen to learning the intricacies of security protocol. Yet, through perseverance and a willingness to learn, he was able to overcome these obstacles and find his footing in this new environment. This experience taught him the importance of adaptability and resilience, qualities that are as crucial in the military as they are in the ever-changing landscape of cybersecurity.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmMax Performing Tabletop Exercises: Tips to Successfully Raise the Bar Throughout Your OrganizationChief Delivery Officer, ITEGRITI CorporationRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: ElmRecent cyber and physical security attacks across critical infrastructure sectors like Energy, IT, Healthcare, and Manufacturing demonstrate the need to prepare for and execute coordinated incident response, disaster recovery, and business continuity procedures within the company as well as potentially with external stakeholders. Tabletop exercises, performed correctly, are a way to reinforce strengths, identify areas of improvement, and build understanding and collaboration between otherwise “stovepiped” business units. Join Bill Lawrence as he relates areas to emphasize to get success with your tabletops to include lessons learned from NERC’s GridEx series of grid security exercises.3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] The Successes and Failures in CybersecurityIT Manager, AMNI International PetroleumGlobal Cyber Security Manager, NewparkVP, Global Information & Product Security, PindropRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterCISOs learn from their successes and failures, sometimes more so from their failures than successes. This session is a safe space to share the strategies, successes and failures in a constructive and thought provoking discussion. Learn from the CISOs with diverse experiences and specializations, across SaaS, Cloud, IT and OT, as they share what to do and especially what not to do in cybersecurity.
- BlumiraBooth: 310
Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.
- D3 SecurityBooth: 300
D3 is building up MSSPs and SecOps teams by offering the most innovative, most reliable security automation platform — no matter the stack or scale required.
- Envision Technology AdvisorsBooth: 140
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- InfraGard HoustonBooth: 270
The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.
- ISACA HoustonBooth: 275
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.
- ISSA South TexasBooth: 240
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
- One IdentityBooth: 350
One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.
- Rapid7Booth: 250
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- Savvy SecurityBooth: 130
Savvy automatically discovers and remediates your most toxic combinations of SaaS identity risk. It also allows you to guide users at scale towards proper security hygiene using just-in-time security guardrails.
- Skybox SecurityBooth: 200
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
- Sprocket SecurityBooth: 220
Sprocket Security was founded to improve the way we approach cybersecurity. Currently the industry performs services in a timeboxed, or point-in-time approach. We think this is fundamentally flawed. We protect your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.
- Syxsense + VLCMBooth: 290
Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.
Since 1983, VLCM (pronounced val-com), an accomplished enterprise IT solutions provider, has built its reputation on forging lifelong partnerships. Our strong relationships with clients and vendors underscore our commitment to delivering custom enterprise technology solutions that align with your unique business goals. We stay ahead of the curve through continuous learning, tackling complex business challenges, and offering innovative IT solutions. Our mission at VLCM transcends delivering solutions, ensuring you consistently Get IT Right. Let’s collaborate to turn your IT complexities into strategic advantages for your business. Get started by visiting www.vlcm.com.
- TevoraBooth: 330
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThalesBooth: 100
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- ThreatLockerBooth: 120
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS Houston AffiliateBooth: 320
Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.
- Zafran SecurityBooth: 210
Zafran optimizes your existing security controls to automatically reveal and mitigate risk exposure beyond legacy patching.
- Dd (Catharina) BudihartoCISO, Advisory Board Member; Founder, Cyber Point Advisory
- Mario ChiockChief of Staff, Itegriti; CISO & Fellow Emeritus, Schlumberger
Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community.
Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating
Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. In 2018 was awarded the South Central Region InfraGard Award for “INMA Leadership!”.
Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member.
Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. Co-Author of "Navigating the Digital Age, Second Edition."
- Sherry HunyadiChief Security Architect, Chevron
Sherry Hunyadi is the Chief Security Architect for Chevron, a role she assumed in May 2021. Sherry leads Chevron’s Cybersecurity Engineering and Innovation team, responsible for strategic direction and technical execution of security-by-design practices across information technology (IT) and operational technology (OT). She is a member of Chevron’s CISO Leadership Team, which is responsible for overall cybersecurity efforts to secure and protect Chevron’s information and assets while ensuring cyber resiliency and data privacy.
Prior to joining Chevron, Sherry served in several IT leadership roles. Most notably, she received a Houston CIO ORBIE award nomination for her work as VP, CIO for Layne Christensen Company prior to and during their acquisition by Granite Construction. With more than 20 years of experience in application development, system architecture, infrastructure, integration, and data analytics across a wide range of industries, Sherry brings a passion for stakeholder partnerships that deliver on the promise of true transformation through technology.
Sherry received her Bachelor of Science degree in Computer Science from Texas A&M University in College Station, Texas. She resides in Spring, Texas with her husband who is an active Warrant Officer in the Texas Army National Guard.
- Manoj TripathiVP, Global Information & Product Security, Pindrop
Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.
- Dd (Catharina) Budiharto, ModeratorCISO, Advisory Board Member; Founder, Cyber Point Advisory
- Chris NicolaouCISO & CIO, Quantum Materials Corp.
- Lisa AngeloCyber Liability & Data Privacy Attorney, Angelo Law Firm PLLC
Lisa M. Angelo has a law practice focused on cyber liability & data privacy. With over a decade of experience, Lisa is one of the first attorneys in Texas to earn a board certification in privacy law, a credential issued from the International Association of Privacy Law Professionals and recognized by the State Bar of Texas. In addition, Lisa has earned two internationally recognized certifications in privacy: she is a Certified Information Privacy Manager (CIPM) and a Certified Information Privacy Professional (CIPP/US).
Lisa advises Fortune 500 businesses in big tech, social media, insurance, retail, and other industries on global data privacy, AI regulation, cyber insurance, technology contracts, intellectual property, and other matters related to technology. In recent months, Lisa was invited to serve on the AI Task Force Committee responsible for making recommendations to the Texas State Bar on AI in the practice of law. Lisa also serves as the Chief of the FBI’s InfraGard Houston Chapter – Legal Cross Sector Council, an initiative for the private and public sectors to share information about cyber risk. Previously, Lisa has served as a member of the State Bar Business Law Section’s Blockchain Committee and an elected council member for the State Bar of Texas Computer & Technology Section. Recognized for her professional achievements, Lisa’s peers named her a Texas Super Lawyers’ Rising Star in 2019-2023.
- Candace McCaddonAttorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon Law
- Violet Sullivan, ModeratorAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & Forster
Violet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.
Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.
As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.
As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.
- Tom ClineVP, Cyber Risk, Skybox Security
15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.
- Michael GreggCISO, State of North Dakota
Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
- Chris WolskiInfraGard Houston Maritime Cross Sector Chief
Chris Wolski is a distinguished information security expert, former Chief Information Security Officer for a Fortune 1000 company, and now provides fractional information security leadership for Applied Security Convergence. He is currently on the board of ISSA South Texas and is dual-hatted as the Maritime Cross Sector Chief for the Houston InfraGard and Area Maritime Security Committee (AMSC) Cyber Subcommittee Chair. He is an award-winning transformational information security leader with over two decades of cross-industry cybersecurity expertise. Distinguished track record of architecting comprehensive resilient cybersecurity strategies and building and developing world-class security teams. Fluent in bridging communication gaps, from frontline staff to boardroom dialogues, ensuring robust, organization-wide security alignment.
His rich career includes leading security at CSAT Solutions and the Port of Houston Authority, where he earned a U.S. Coast Guard Meritorious Service Citation. His cybersecurity expertise cuts across critical infrastructure, manufacturing, retail, healthcare, and government sectors. As a retired U.S. Navy Chief Petty Officer, he has managed information security operations involving multinational organizations. He supervised an expedited threat communication system for 191 Houston Ship Channel Security District organizations. Chris holds an MBA and a Bachelor of Science in Cybersecurity from the University of Maryland Global Campus.
- Jason AlbuquerqueChief Operating Officer, Envision
With more than 20 years of experience in the technology field, Jason has served in numerous leadership role in his career leading to the Chief Operating Officer position with Envision.
Jason takes pride in leading the charge, and in building a culture that is innovative and secure by design for the business and its clients. He brings the strategic insight, industry knowledge, and agility that today’s industry requires to effectively respond to the rapidly changing technology, threat, risk, and business landscapes.
He has been the recipient of several prestigious recognitions and awards in technology and leadership, including being named a “2021 Top Cybersecurity Leader" by Security Magazine partnered with (ISC), Rhode Island’s 40 under Forty Award, and Rhode Island’s Tech 10 Award. He is also a seven-time National Public Technology Institute Solutions Award winner.
Jason currently co-hosts the Business Security Weekly podcast and serves on Congressman Langevin’s (Congressional Cybersecurity Caucus co-chair) Cybersecurity Advisory Committee. He also serves on the Tech Collective Board of Directors and the Rhode Island Joint Cyber Task Force.
- Debra BrownVice President, Savvy
Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate learner, book lover, and a devoted mother and wife in a loving, blended family.
- Andrei TchouvelevChief Innovation Officer, Syxsense
Andrei Tchouvelev, Syxsense Chief Innovation Officer, is a critical thinker, ideator, speaker, evangelist, and an accomplished executive with a breadth of strategic and operational expertise. Andrei has an extensive knowledge of the technology space, and a wealth of market positioning and business acceleration experience. His current role as Chief Innovation Officer focuses on strategic technologies and business transformation. Previously, Andrei collaborated with some of the world’s innovative technology companies and served in a range of leadership positions such as CTO, CIO, Executive board member and advisor
- Berris Bramble, ModeratorDirector of Information Security, Commercial Real Estate Industry
Berris Bramble holds a Computer Science degree, is a founding member of the local InfraGard Technology Cross Sector Council, and regularly volunteers at local cyber conferences and events. He is a 20-year active member in the local InfraGard Houston chapter participating at the Board and leadership levels. He has spent the bulk of his career in Oil & Gas with the longest tenure of 14 years at Saudi Aramco. but have since moved over to the Commercial Real Estate industry. He holds a general class license in Amateur Radio, found a new love for e-biking and is an avid DefCon attendee. He has 23 years of cyber expertise across many disciplines.
- Alamdar HamdaniUnited States Attorney, Southern District of Texas, DOJ
Alamdar Hamdani is the 24th United States Attorney (USA) for the Southern District of Texas. Nominated by President Biden in October 2022 and confirmed by the United States Senate in December 2022, Hamdani is the chief federal law enforcement officer for the Southern District of Texas (SDTX). The district was established in 1902 and encompasses seven divisions with federal district courts in Houston, Galveston, Victoria, Corpus Christi, Brownsville, McAllen and Laredo. As USA, Hamdani supervises the investigation and prosecution of all federal crimes and the litigation of all civil matters in which the United States has an interest.
Hamdani joined the SDTX in 2014, but has been with the Department of Justice since 2008. As an AUSA with the SDTX, he was primarily responsible for the investigation and prosecution of national security and official corruption crimes. From 2010 to 2014, Hamdani served in the Counterterrorism Section of the Department of Justice’s National Security Division, holding the position of deputy chief from 2012 to 2014. Prior to that, he was an AUSA in the Eastern District of Kentucky.
Prior to his government service, Hamdani was a partner at the law firm of Hamdani & Simon LLP in Texas from 2005 to 2008 where he litigated corporate disputes and civil rights matters. In 2003, he helped form the South Asian Bar Association of North America, holding various leadership positions in the organization, including president from 2007 to 2008. From 2001 to 2005, Hamdani was an associate attorney in the Houston office of the law firm Winstead P.C.
During his tenure as an AUSA with the SDTX, Hamdani was also an adjunct professor at the University of Houston Law Center.
Hamdani received his J.D. from the University of Houston Law Center in 1999 and his B.B.A. from the University of Texas at Austin in 1993.
- Bryan PerkolaVP, Information Security, First Community Credit Union
Bryan Perkola, CISSP, CISM, is a passionate cybersecurity professional and IT veteran with over thirty years of experience primarily in organizations associated with manufacturing, retail, and finance. Bryan holds multiple bachelor's degrees from the University of Houston in Marketing and Organizational Behavior and Management and has received his master’s degree in Cybersecurity and Information Assurance from Western Governor’s University in addition to numerous industry certifications. Bryan’s work experience has primarily been involved with small to mid-sized organizations where he was intimately involved with multiple disciplines such as marketing and human resources that has provided him some unique perspectives and understandings for developing creative and effective security awareness programs that promote a strong cybersecurity culture within the organization.
- Gabrielle BryantVP, Cyber Practice Leader, Cadence Insurance
As the Cyber Practice Leader, Gabrielle Bryant focuses on the strategic and operational vision regarding how cyber exposures will impact our clients as well as researching methodologies to mitigate emerging cyber threats and their intersectionality with other lines of coverage.
Before becoming Cyber Practice Leader, Gabrielle Bryant was a Cybersecurity Advisory Consultant responsible for delivering targeted technical assessments and conducting cybersecurity risk assessments using industry standard frameworks.
Gabrielle held the position as Senior Cyber Broker with Aon’s Cyber Solutions Southwest team, which provided her with a strong foundation in Cyber and Professional Liability risks and was also an Account Executive/Broker with the Aon Ascent team, which focuses on small to medium sized business.
Gabrielle earned a M.Sc. from Saint Mary's University of MN and a Bachelor in Business Administration degree in Risk Management and Insurance from Baylor University.
- Devin KruglyDirector, Practice Advisor, Rapid7
Devin Krugly is the senior security executive with an ardent focus in establishing and maturing an enterprise security strategy to reduce cyber risk by strengthening attack surface and risk management programs. Devin has over 21 years of experience with numerous Fortune 500 companies as a practitioner and consultant in managing technical and operational risk through informed business decisions. He has built and operated cloud-based risk and application security programs for large and small enterprises. Prior to joining Rapid7 Devin oversaw the Vulnerability & Attack Surface Management portfolio for Deloitte’s Cyber Risk practice. Devin holds an undergraduate degree in Management Information Systems from the University of Houston and an MBA from Rice University, as well as active CISSP and CCSP certifications from ISC2.
- Victor MendozaPrincipal Solutions Architect, Thales
Victor Mendoza, Principal Solutions Architect for Thales, is a member of the Cloud Protection and Licensing Solutions teams with 15+ years of experience in IT and cybersecurity. Today he works with companies in finance, healthcare, and oil & gas to streamline data security operations, accelerate growth and reduce risk to their most critical data or information from being disclosed, alter or denied access to. Previously, he work for a managed web hosting company before delivering strategic consulting services and leading an encryption services team for an organization with global presence.
- Eric C. Botts, ModeratorDirector, Global Cybersecurity Program, University of St. Thomas
Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.
Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).
- Reanna SchultzTeam Leader of Information Security, Garmin
Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.
- Akshit GoelCybersecurity Architect, Schlumberger (SLB)
Akshit Goel is a Cybersecurity Architect at SLB where he leads a team of security engineers to deliver secure software solutions to the Energy industry. He helps the teams design, build, and test security solutions and tools. His focus areas are Application Security, Cloud Security, and DevSecOps. He is an automation enthusiast and pursues the mission of implementing DevSecOps and automated security testing across the organization. He assists software development teams in threat assessment, cyber risk evaluation, and reduction and vulnerability management.
- Gabriel NwajiakuCommissioner, City of Austin's Community Technology and Telecommunications Commission
Gabriel Nwajiaku is a seasoned cybersecurity expert, army veteran, and community leader. Holding a diverse array of certifications including CISM, PMP, Security+, and CySA+, Gabriel brings a wealth of knowledge and experience to the table. His journey began in the military, where he honed his skills in strategic planning and risk management, serving his country with distinction.
After transitioning from the military, Gabriel continued his pursuit of excellence in cybersecurity, earning multiple certifications to further solidify his expertise. His commitment to continuous learning and professional development has enabled him to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats and challenges.
In addition to his impressive professional achievements, Gabriel is also deeply engaged in his community. As the Commissioner of the City of Austin's Community Technology and Telecommunications Commission, he plays a vital role in shaping policies and initiatives that promote digital inclusion and access to technology for all residents.
With a passion for empowering individuals and organizations to navigate the complexities of cybersecurity, Gabriel brings a unique perspective to the table. His insights into establishing purpose and direction in this nebulous terrain are sure to inspire and enlighten audiences at the conference.
- Bill Lawrence, CISSPChief Delivery Officer, ITEGRITI Corporation
Bill Lawrence, Chief Delivery Officer, ITEGRITI (CISSP, MS International Relations, MS Military Science, BS Computer Science), is a cybersecurity executive who previously served as the NERC VP/CSO and Senior Director of the E-ISAC. He led 40 employees in a 24/7 information sharing and analysis center to defend the North American electric grid. He has also served as a CISO for a SaaS risk assessment company protecting the data of several top oil and gas clients, and as a Commander in the U.S. Navy flying F-14 Tomcats and F/A-18 Super Hornets off aircraft carriers in combat. Over his career, he greatly expanded international grid security exercises and conferences and earned awards as a CISO as well as a leader and instructor in the U.S. Navy. Bill specializes in cybersecurity, leadership, client trust, AI, and critical infrastructure. He serves on the Houston Innovation Advisory Council, is a member of InfraGard, and helps lead the Houston Chapter of Control System Cyber Security Alliance International [(CS)2AI].
- Happy Hour
- Andreea AndersonIT Manager, AMNI International Petroleum
IT Manager for AMNI International Petroleum, with over 15 years of experience in leading technical teams and leading strategic IT initiatives. With a robust background in technical architecture and design, Andreea has consistently delivered innovative solutions to enhance operational efficiency and align IT with business objectives.
Holding a certificate from MIT in Strategic Technology Roadmapping and Innovation, Andreea brings a strategic mindset to her leadership role, ensuring that IT initiatives are in sync with organizational goals.
Throughout her career, she has successfully overseen the overhaul of IT infrastructure for multiple clients across various industries, resulting in significant improvements in data processing time and service delivery costs.
- James ParksGlobal Cyber Security Manager, Newpark
- Manoj Tripathi, ModeratorVP, Global Information & Product Security, Pindrop
Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes