googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, April 4, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Navigating Burnout and Setting Boundaries in Cybersecurity
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Live Oak B
    Join us for a candid dialogue on fostering well-being, promoting work-life balance, and building mental resilience within cybersecurity teams. Together, let’s strengthen the guardians of our digital frontiers for a healthier and more sustainable future.
    8:00 am
    WiCyS Houston Affiliate Meeting [Open to all attendees]
    • session level icon
    Let’s Discuss the 'B' Word for Women in Cybersecurity
    speaker photo
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Pecan

    No, it’s not the ‘B’ word you are thinking of.

    8:00 am
    ISSA South Texas Chapter Meeting
    • session level icon
    Open to all attendees
    speaker photo
    Vice President, ISSA South Texas
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Elm
    Come join chapter members to network, learn about ISSA South Texas, and meet your local chapter board members.
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Secure by Design: A Cyber Symphony of Unsung Heroes
    • session level icon
    speaker photo
    Chief of Staff, Itegriti; CISO & Fellow Emeritus, Schlumberger
    speaker photo
    Chief Security Architect, Chevron
    speaker photo
    VP, Global Information & Product Security, Pindrop
    speaker photo
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    In this opening keynote, we’ll shine a spotlight on the unsung heroes of the cyber realm and their indispensable role in orchestrating a resilient defense against digital threats.

    Join us as we unveil the tales of leaders who have embraced the mission to secure our digital frontiers. Through a captivating narrative that seamlessly blends leadership prowess with superhero-esque resilience, we’ll showcase how these unsung heroes infuse security into the very core of their organizations.

    Get ready to be inspired by stories of triumph and strategies that mirror the superhero ethos, creating a cybersecurity landscape that is not just secure but fortified by the strength of its guardians. Let’s celebrate the unsung heroes of cybersecurity and set the stage for a day dedicated to innovation, collaboration, and a future that is undeniably “Secure by Design.”

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Empowering Organizations: Educating End Users, Executives, and Boards on Cyber Risk Mitigation
    • session level icon
    speaker photo
    CISO & CIO, Quantum Materials Corp.
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Elm

    In this session, we will delve into the critical importance of educating all stakeholders on cyber risks and the necessary mitigation strategies. By fostering a culture of cybersecurity awareness and responsibility throughout the organization, attendees will learn how to fortify their defenses, mitigate potential threats, and protect sensitive data against evolving cyber threats.

    10:15 am
    CyberRisk Jenga: Balancing AI, Law, and Technology
    • session level icon
    speaker photo
    Cyber Liability & Data Privacy Attorney, Angelo Law Firm PLLC
    speaker photo
    Attorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon Law
    speaker photo
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & Forster
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Pecan

    “CyberRisk Jenga: Balancing AI, Law, and Technology” explores the precarious intersection of artificial intelligence, legal frameworks, and technological advancements. This session delves into strategies for managing the intricate risks emerging from AI integration in cyber systems. Attendees will gain insights into harmonizing technological innovation with legal compliance in an increasingly AI-driven world.

    10:15 am
    Mind the Gap: Why Modern Vulnerability Management Demands More than Scan-and-Patch
    • session level icon
    speaker photo
    VP, Cyber Risk, Skybox Security
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Live Oak A

    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to the importance of the asset or its exposure to potential attack across the network.

    To have a real impact on lowering your risk of cyberattack, a modern vulnerability management program needs to provide you with an up-to-the-minute view of all the vulnerabilities in the estate, immediate insights into those that matter to your organization, and how to remediate them. All without waiting for the next patch cycle.

    In this session, you will learn:

    • How the visibility of your assets, networks, business, and security data impacts vulnerability risk.
    • What scanners miss in discovery and prioritization, and how to fill in the gaps.
    • How to reduce the scan-and-patch lag from weeks to hours.

    Join Dr. Howard Goodman as he explores how modern vulnerability management helps you to centralize and analyze data from the entire attack surface, prioritize those threats that represent the highest risk to you, and act more quickly to remediate those vulnerabilities most likely to be used in a cyberattack.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Using People, Process, and Technology to Build a World Class SOC
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Elm

    Session description to come.

    11:10 am
    Beyond the Breach: Navigating the Emotional Cyber Storm in Organizations
    • session level icon
    speaker photo
    InfraGard Houston Maritime Cross Sector Chief
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Live Oak A

    In this presentation, we explore the psychological aftermath of cyber attacks on organizations, highlighting the spectrum of mental health challenges faced by employees, from stress and anxiety to PTSD and depression. The discussion emphasizes the importance of addressing the strain on IT staff, the erosion of trust, the persistent fear of future attacks, and the impact on personal identity and self-esteem. By advocating for a holistic approach to cyber security that includes psychological support and preventive strategies, the presentation underscores the need for resilience-building measures and a blame-free culture to help organizations and their workforce navigate the complex emotional landscape post-attack, ensuring both technological and psychological recovery.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Chief Operating Officer, Envision
    speaker photo
    Vice President, Savvy
    speaker photo
    Chief Innovation Officer, Syxsense
    speaker photo
    Director of Information Security, Commercial Real Estate Industry
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Pecan

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] Securing Our Digital Frontiers: A Legal Perspective on Nation-State Cyber Threats
    • session level icon
    speaker photo
    United States Attorney, Southern District of Texas, DOJ
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Delve deep into the world of advanced cyber tools utilized by China and other nation-state actors and gain a comprehensive understanding of the evolving tactics, techniques, and procedures employed in their pursuit. This session offers a nuanced exploration of the current threat landscape, using real-world examples and case studies to illustrate the potential impact on the United States.

    Explore the legal dimensions of countering cyber threats as we dive into the intricacies of law enforcement’s role and the challenges posed by prosecuting cybercriminals across international borders. Learn about collaborative initiatives aimed at strengthening national cybersecurity defenses and fortifying critical infrastructure against emerging threats.

    This is your opportunity to be well-informed, engaged, and empowered in the ongoing battle against cyber threats posed by nation-state actors. Discover how legal frameworks and collaborative efforts are shaping the defense strategies that protect our digital frontiers.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Selling Security Awareness to Your Employees
    • session level icon
    speaker photo
    VP, Information Security, First Community Credit Union
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Live Oak A

    This presentation is not a “how-to” guide on developing an effective security awareness program, but an exploration of ideas rooted in marketing concepts security professionals can utilize to create or enhance their own programs. Topics will range through a variety of concepts but some of the highlights will be the need for “branding” an organization’s program to establish an identity with the employees, conveying security operations role within the organization, ways to improve your employee’s participation in the security awareness program, what’s in the program for your employees, and useful metrics to measure participation in your program. The presentation will outline ways security practitioners can convey their security messages to employees in unique and fun ways that will excite and improve employee involvement with the program utilizing marketing concepts.

    1:15 pm
    Navigating the Digital Abyss: Unmasking the True Cost of Ransom vs. Cyber Insurance
    • session level icon
    speaker photo
    VP, Cyber Practice Leader, Cadence Insurance
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Elm

    This session aims to explore the advantages of cyber insurance and its increasing relevance in today’s rapidly evolving technological landscape. Cybercrime has become one of the most significant risks faced by businesses globally, with the cost of cyber-attacks and data breaches escalating year on year. The advent of ransomware has only heightened this threat, with statistics revealing that ransomware attacks increased by 485% in 2020 alone.

    The cost of ransomware is also rising, with some attacks costing in the region of tens of millions of dollars. Cyber insurance is an excellent form of both risk management and financial risk transfer by providing businesses with an essential safety net in the event of a cyber-attack, offering financial support and assistance to cover the costs incurred by the attack through business interruption, data recovery, third-party liability, and reputational damage costs.

    Additionally, cyber insurance providers often provide additional risk management services such as non-intrusive vulnerability assessments, tabletops, and incident response planning to help businesses identify potential risks and implement preventative measures to reduce the likelihood of a cyber-attack. With the escalating cost and frequency of cyber-attacks, having cyber insurance is becoming an essential component of any effective cybersecurity strategy- it provides businesses with financial protection and additional risk management services to help minimize the impact of a cyber-attack.

    As such, it is crucial that businesses give serious consideration to the advantages of cyber insurance and explore their options for this form of protection.

    In this session, we’ll delve into the complex interplay between cyber insurance policies and the rising threat of ransomware attacks. Join us as we explore the nuances, dispel insurance myths, and uncover strategies to safeguard organizations in today’s ever-evolving digital landscape.

    Key Points:

    • Advantages and disadvantages of having cyber insurance
    • What does cyber insurance cover vs. not cover?
    • Increasing cost of ransomware and what that means for companies
    • Detailing how cyber insurance is a great form of holistic enterprise risk management and financial risk transfer.
    1:15 pm
    [Panel] Beyond the Shadows: Anticipating Tomorrow's Cyber Threats
    • session level icon
    speaker photo
    Co-Founder & CEO, Zafran Security
    speaker photo
    Director, Practice Advisor, Rapid7
    speaker photo
    Principal Solutions Architect, Thales
    speaker photo
    Director, Global Cybersecurity Program, University of St. Thomas
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Pecan

    In the dynamic realm of cybersecurity, the battle between defenders and digital villains is an ongoing saga. This forward-looking session will explore the evolution of cyber threats, forecasting the next wave of challenges that organizations and individuals may face. We aim to unmask the upcoming generation of digital villains, examining their sophisticated tactics and exploiting vulnerabilities that may become prevalent in the future.

    Our distinguished panel of cybersecurity experts will dissect the motivations driving these threats, from the ever-adapting strategies of profit-driven cybercriminals to the evolving techniques employed by state-sponsored actors wielding cyberweapons. As we peer into the future, we will also address the role of emerging technologies in reshaping the threat landscape, providing insights that empower organizations to proactively defend against tomorrow’s cyber challenges.

    Join us in this exploration of the unseen, as we strive to anticipate and understand the threats that lie beyond the shadows of the current cybersecurity landscape.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Social Engineering: Training the Human Firewall
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Elm

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    2:10 pm
    Automated Application Security Posture Management at SLB
    • session level icon
    speaker photo
    Cybersecurity Architect, Schlumberger (SLB)
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Pecan

    Learn how automated application security enables product teams in SLB to continuously deliver secure products to clients. As product teams release every few hours or days, security compliance needs to be automated as well. This presentation will showcase the DevSecOps process used at SLB to automate security testing and security compliance. I will elaborate on the reporting requirements that enable product and security teams to review existing risks, vulnerabilities, and possible mitigations. I will elaborate on the application security risk matrix which can be used in agile development to secure continuous releases.

    2:10 pm
    Loaves and Phishes: Establishing Purpose in the Nebulous and Evolving Terrain of Cybersecurity
    • session level icon
    speaker photo
    Commissioner, City of Austin's Community Technology and Telecommunications Commission
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Live Oak A

    After spending time in the Army, Gabriel began to transition into the cybersecurity sector, safeguarding digital infrastructures against evolving threats. He felt a calling to serve his country in a more direct and tangible manner. The decision to transition was not easy, as it required leaving behind a guaranteed path for the unknown challenges of civilian life. However, he was driven by a desire to apply his expertise in a different context, one where the stakes were even higher, and the impact more immediate.

    During this journey, he encountered various challenges, from adapting to the rigorous physical training regimen to learning the intricacies of security protocol. Yet, through perseverance and a willingness to learn, he was able to overcome these obstacles and find his footing in this new environment. This experience taught him the importance of adaptability and resilience, qualities that are as crucial in the military as they are in the ever-changing landscape of cybersecurity.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Max Performing Tabletop Exercises: Tips to Successfully Raise the Bar Throughout Your Organization
    • session level icon
    speaker photo
    Chief Delivery Officer, ITEGRITI Corporation
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Elm
    Recent cyber and physical security attacks across critical infrastructure sectors like Energy, IT, Healthcare, and Manufacturing demonstrate the need to prepare for and execute coordinated incident response, disaster recovery, and business continuity procedures within the company as well as potentially with external stakeholders. Tabletop exercises, performed correctly, are a way to reinforce strengths, identify areas of improvement, and build understanding and collaboration between otherwise “stovepiped” business units.  Join Bill Lawrence as he relates areas to emphasize to get success with your tabletops to include lessons learned from NERC’s GridEx series of grid security exercises.
    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote] The Successes and Failures in Cybersecurity
    • session level icon
    speaker photo
    IT Manager, AMNI International Petroleum
    speaker photo
    Global Cyber Security Manager, Newpark
    speaker photo
    VP, Global Information & Product Security, Pindrop
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    CISOs learn from their successes and failures, sometimes more so from their failures than successes. This session is a safe space to share the strategies, successes and failures in a constructive and thought provoking discussion. Learn from the CISOs with diverse experiences and specializations, across SaaS, Cloud, IT and OT,  as they share what to do and especially what not to do in cybersecurity.

Exhibitors
  • Blumira
    Booth: 310

    Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.

    Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

  • D3 Security
    Booth: 300

    D3 is building up MSSPs and SecOps teams by offering the most innovative, most reliable security automation platform — no matter the stack or scale required.

  • Envision Technology Advisors
    Booth: 140

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • InfraGard Houston
    Booth: 270

    The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.

  • ISACA Houston
    Booth: 275

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.

  • ISSA South Texas
    Booth: 240

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • One Identity
    Booth: 350

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

  • Rapid7
    Booth: 250

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Savvy Security
    Booth: 130

    Savvy automatically discovers and remediates your most toxic combinations of SaaS identity risk. It also allows you to guide users at scale towards proper security hygiene using just-in-time security guardrails.

  • Skybox Security
    Booth: 200

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Sprocket Security
    Booth: 220

    Sprocket Security was founded to improve the way we approach cybersecurity. Currently the industry performs services in a timeboxed, or point-in-time approach. We think this is fundamentally flawed. We protect your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

  • Syxsense + VLCM
    Booth: 290

    Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.

    Since 1983, VLCM (pronounced val-com), an accomplished enterprise IT solutions provider, has built its reputation on forging lifelong partnerships. Our strong relationships with clients and vendors underscore our commitment to delivering custom enterprise technology solutions that align with your unique business goals. We stay ahead of the curve through continuous learning, tackling complex business challenges, and offering innovative IT solutions. Our mission at VLCM transcends delivering solutions, ensuring you consistently Get IT Right. Let’s collaborate to turn your IT complexities into strategic advantages for your business. Get started by visiting www.vlcm.com.

  • Tevora
    Booth: 330

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Thales
    Booth: 100

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: 120

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS Houston Affiliate
    Booth: 320

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

  • Zafran Security
    Booth: 210

    Zafran Risk & Mitigation Platform defuses threat exploitation by mobilizing existing security tools

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dd (Catharina) Budiharto
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
  • speaker photo
    Eleni Drier
    Vice President, ISSA South Texas
  • speaker photo
    Mario Chiock
    Chief of Staff, Itegriti; CISO & Fellow Emeritus, Schlumberger

    Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community.

    Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating

    Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. In 2018 was awarded the South Central Region InfraGard Award for “INMA Leadership!”.

    Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member.

    Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. Co-Author of "Navigating the Digital Age, Second Edition."

  • speaker photo
    Sherry Hunyadi
    Chief Security Architect, Chevron

    Sherry Hunyadi is the Chief Security Architect for Chevron, a role she assumed in May 2021. Sherry leads Chevron’s Cybersecurity Engineering and Innovation team, responsible for strategic direction and technical execution of security-by-design practices across information technology (IT) and operational technology (OT). She is a member of Chevron’s CISO Leadership Team, which is responsible for overall cybersecurity efforts to secure and protect Chevron’s information and assets while ensuring cyber resiliency and data privacy.

    Prior to joining Chevron, Sherry served in several IT leadership roles. Most notably, she received a Houston CIO ORBIE award nomination for her work as VP, CIO for Layne Christensen Company prior to and during their acquisition by Granite Construction. With more than 20 years of experience in application development, system architecture, infrastructure, integration, and data analytics across a wide range of industries, Sherry brings a passion for stakeholder partnerships that deliver on the promise of true transformation through technology.

    Sherry received her Bachelor of Science degree in Computer Science from Texas A&M University in College Station, Texas. She resides in Spring, Texas with her husband who is an active Warrant Officer in the Texas Army National Guard.

  • speaker photo
    Manoj Tripathi
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

  • speaker photo
    Dd (Catharina) Budiharto, Moderator
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
  • speaker photo
    Chris Nicolaou
    CISO & CIO, Quantum Materials Corp.
  • speaker photo
    Lisa Angelo
    Cyber Liability & Data Privacy Attorney, Angelo Law Firm PLLC

    Lisa M. Angelo has a law practice focused on cyber liability & data privacy. With over a decade of experience, Lisa is one of the first attorneys in Texas to earn a board certification in privacy law, a credential issued from the International Association of Privacy Law Professionals and recognized by the State Bar of Texas. In addition, Lisa has earned two internationally recognized certifications in privacy: she is a Certified Information Privacy Manager (CIPM) and a Certified Information Privacy Professional (CIPP/US).

    Lisa advises Fortune 500 businesses in big tech, social media, insurance, retail, and other industries on global data privacy, AI regulation, cyber insurance, technology contracts, intellectual property, and other matters related to technology. In recent months, Lisa was invited to serve on the AI Task Force Committee responsible for making recommendations to the Texas State Bar on AI in the practice of law. Lisa also serves as the Chief of the FBI’s InfraGard Houston Chapter – Legal Cross Sector Council, an initiative for the private and public sectors to share information about cyber risk. Previously, Lisa has served as a member of the State Bar Business Law Section’s Blockchain Committee and an elected council member for the State Bar of Texas Computer & Technology Section. Recognized for her professional achievements, Lisa’s peers named her a Texas Super Lawyers’ Rising Star in 2019-2023.

  • speaker photo
    Candace McCaddon
    Attorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon Law
  • speaker photo
    Violet Sullivan, Moderator
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & Forster

    Violet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.

    Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.

    As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.

    As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.

  • speaker photo
    Tom Cline
    VP, Cyber Risk, Skybox Security

    15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.

  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Chris Wolski
    InfraGard Houston Maritime Cross Sector Chief

    Chris Wolski is a distinguished information security expert, former Chief Information Security Officer for a Fortune 1000 company, and now provides fractional information security leadership for Applied Security Convergence. He is currently on the board of ISSA South Texas and is dual-hatted as the Maritime Cross Sector Chief for the Houston InfraGard and Area Maritime Security Committee (AMSC) Cyber Subcommittee Chair. He is an award-winning transformational information security leader with over two decades of cross-industry cybersecurity expertise. Distinguished track record of architecting comprehensive resilient cybersecurity strategies and building and developing world-class security teams. Fluent in bridging communication gaps, from frontline staff to boardroom dialogues, ensuring robust, organization-wide security alignment.

    His rich career includes leading security at CSAT Solutions and the Port of Houston Authority, where he earned a U.S. Coast Guard Meritorious Service Citation. His cybersecurity expertise cuts across critical infrastructure, manufacturing, retail, healthcare, and government sectors. As a retired U.S. Navy Chief Petty Officer, he has managed information security operations involving multinational organizations. He supervised an expedited threat communication system for 191 Houston Ship Channel Security District organizations. Chris holds an MBA and a Bachelor of Science in Cybersecurity from the University of Maryland Global Campus.

  • speaker photo
    Jason Albuquerque
    Chief Operating Officer, Envision

    With more than 20 years of experience in the technology field, Jason has served in numerous leadership role in his career leading to the Chief Operating Officer position with Envision.

    Jason takes pride in leading the charge, and in building a culture that is innovative and secure by design for the business and its clients. He brings the strategic insight, industry knowledge, and agility that today’s industry requires to effectively respond to the rapidly changing technology, threat, risk, and business landscapes.

    He has been the recipient of several prestigious recognitions and awards in technology and leadership, including being named a “2021 Top Cybersecurity Leader" by Security Magazine partnered with (ISC), Rhode Island’s 40 under Forty Award, and Rhode Island’s Tech 10 Award. He is also a seven-time National Public Technology Institute Solutions Award winner.

    Jason currently co-hosts the Business Security Weekly podcast and serves on Congressman Langevin’s (Congressional Cybersecurity Caucus co-chair) Cybersecurity Advisory Committee. He also serves on the Tech Collective Board of Directors and the Rhode Island Joint Cyber Task Force.

  • speaker photo
    Debra Brown
    Vice President, Savvy

    Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate learner, book lover, and a devoted mother and wife in a loving, blended family.

  • speaker photo
    Andrei Tchouvelev
    Chief Innovation Officer, Syxsense

    Andrei Tchouvelev, Syxsense Chief Innovation Officer, is a critical thinker, ideator, speaker, evangelist, and an accomplished executive with a breadth of strategic and operational expertise. Andrei has an extensive knowledge of the technology space, and a wealth of market positioning and business acceleration experience. His current role as Chief Innovation Officer focuses on strategic technologies and business transformation. Previously, Andrei collaborated with some of the world’s innovative technology companies and served in a range of leadership positions such as CTO, CIO, Executive board member and advisor

  • speaker photo
    Berris Bramble, Moderator
    Director of Information Security, Commercial Real Estate Industry

    Berris Bramble holds a Computer Science degree, is a founding member of the local InfraGard Technology Cross Sector Council, and regularly volunteers at local cyber conferences and events. He is a 20-year active member in the local InfraGard Houston chapter participating at the Board and leadership levels. He has spent the bulk of his career in Oil & Gas with the longest tenure of 14 years at Saudi Aramco. but have since moved over to the Commercial Real Estate industry. He holds a general class license in Amateur Radio, found a new love for e-biking and is an avid DefCon attendee. He has 23 years of cyber expertise across many disciplines.

  • speaker photo
    Alamdar Hamdani
    United States Attorney, Southern District of Texas, DOJ

    Alamdar Hamdani is the 24th United States Attorney (USA) for the Southern District of Texas. Nominated by President Biden in October 2022 and confirmed by the United States Senate in December 2022, Hamdani is the chief federal law enforcement officer for the Southern District of Texas (SDTX). The district was established in 1902 and encompasses seven divisions with federal district courts in Houston, Galveston, Victoria, Corpus Christi, Brownsville, McAllen and Laredo. As USA, Hamdani supervises the investigation and prosecution of all federal crimes and the litigation of all civil matters in which the United States has an interest.

    Hamdani joined the SDTX in 2014, but has been with the Department of Justice since 2008. As an AUSA with the SDTX, he was primarily responsible for the investigation and prosecution of national security and official corruption crimes. From 2010 to 2014, Hamdani served in the Counterterrorism Section of the Department of Justice’s National Security Division, holding the position of deputy chief from 2012 to 2014. Prior to that, he was an AUSA in the Eastern District of Kentucky.

    Prior to his government service, Hamdani was a partner at the law firm of Hamdani & Simon LLP in Texas from 2005 to 2008 where he litigated corporate disputes and civil rights matters. In 2003, he helped form the South Asian Bar Association of North America, holding various leadership positions in the organization, including president from 2007 to 2008. From 2001 to 2005, Hamdani was an associate attorney in the Houston office of the law firm Winstead P.C.

    During his tenure as an AUSA with the SDTX, Hamdani was also an adjunct professor at the University of Houston Law Center.

    Hamdani received his J.D. from the University of Houston Law Center in 1999 and his B.B.A. from the University of Texas at Austin in 1993.

  • speaker photo
    Bryan Perkola
    VP, Information Security, First Community Credit Union

    Bryan Perkola, CISSP, CISM, is a passionate cybersecurity professional and IT veteran with over thirty years of experience primarily in organizations associated with manufacturing, retail, and finance. Bryan holds multiple bachelor's degrees from the University of Houston in Marketing and Organizational Behavior and Management and has received his master’s degree in Cybersecurity and Information Assurance from Western Governor’s University in addition to numerous industry certifications. Bryan’s work experience has primarily been involved with small to mid-sized organizations where he was intimately involved with multiple disciplines such as marketing and human resources that has provided him some unique perspectives and understandings for developing creative and effective security awareness programs that promote a strong cybersecurity culture within the organization.

  • speaker photo
    Gabrielle Bryant
    VP, Cyber Practice Leader, Cadence Insurance

    As the Cyber Practice Leader, Gabrielle Bryant focuses on the strategic and operational vision regarding how cyber exposures will impact our clients as well as researching methodologies to mitigate emerging cyber threats and their intersectionality with other lines of coverage.

    Before becoming Cyber Practice Leader, Gabrielle Bryant was a Cybersecurity Advisory Consultant responsible for delivering targeted technical assessments and conducting cybersecurity risk assessments using industry standard frameworks.

    Gabrielle held the position as Senior Cyber Broker with Aon’s Cyber Solutions Southwest team, which provided her with a strong foundation in Cyber and Professional Liability risks and was also an Account Executive/Broker with the Aon Ascent team, which focuses on small to medium sized business.

    Gabrielle earned a M.Sc. from Saint Mary's University of MN and a Bachelor in Business Administration degree in Risk Management and Insurance from Baylor University.

  • speaker photo
    Sanaz Yashar
    Co-Founder & CEO, Zafran Security
  • speaker photo
    Devin Krugly
    Director, Practice Advisor, Rapid7

    Devin Krugly is the senior security executive with an ardent focus in establishing and maturing an enterprise security strategy to reduce cyber risk by strengthening attack surface and risk management programs. Devin has over 21 years of experience with numerous Fortune 500 companies as a practitioner and consultant in managing technical and operational risk through informed business decisions. He has built and operated cloud-based risk and application security programs for large and small enterprises. Prior to joining Rapid7 Devin oversaw the Vulnerability & Attack Surface Management portfolio for Deloitte’s Cyber Risk practice. Devin holds an undergraduate degree in Management Information Systems from the University of Houston and an MBA from Rice University, as well as active CISSP and CCSP certifications from ISC2.

  • speaker photo
    Victor Mendoza
    Principal Solutions Architect, Thales

    Victor Mendoza, Principal Solutions Architect for Thales, is a member of the Cloud Protection and Licensing Solutions teams with 15+ years of experience in IT and cybersecurity. Today he works with companies in finance, healthcare, and oil & gas to streamline data security operations, accelerate growth and reduce risk to their most critical data or information from being disclosed, alter or denied access to. Previously, he work for a managed web hosting company before delivering strategic consulting services and leading an encryption services team for an organization with global presence.

  • speaker photo
    Eric C. Botts, Moderator
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.

    Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Akshit Goel
    Cybersecurity Architect, Schlumberger (SLB)

    Akshit Goel is a Cybersecurity Architect at SLB where he leads a team of security engineers to deliver secure software solutions to the Energy industry. He helps the teams design, build, and test security solutions and tools. His focus areas are Application Security, Cloud Security, and DevSecOps. He is an automation enthusiast and pursues the mission of implementing DevSecOps and automated security testing across the organization. He assists software development teams in threat assessment, cyber risk evaluation, and reduction and vulnerability management.

  • speaker photo
    Gabriel Nwajiaku
    Commissioner, City of Austin's Community Technology and Telecommunications Commission

    Gabriel Nwajiaku is a seasoned cybersecurity expert, army veteran, and community leader. Holding a diverse array of certifications including CISM, PMP, Security+, and CySA+, Gabriel brings a wealth of knowledge and experience to the table. His journey began in the military, where he honed his skills in strategic planning and risk management, serving his country with distinction.

    After transitioning from the military, Gabriel continued his pursuit of excellence in cybersecurity, earning multiple certifications to further solidify his expertise. His commitment to continuous learning and professional development has enabled him to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats and challenges.

    In addition to his impressive professional achievements, Gabriel is also deeply engaged in his community. As the Commissioner of the City of Austin's Community Technology and Telecommunications Commission, he plays a vital role in shaping policies and initiatives that promote digital inclusion and access to technology for all residents.

    With a passion for empowering individuals and organizations to navigate the complexities of cybersecurity, Gabriel brings a unique perspective to the table. His insights into establishing purpose and direction in this nebulous terrain are sure to inspire and enlighten audiences at the conference.

  • speaker photo
    Bill Lawrence, CISSP
    Chief Delivery Officer, ITEGRITI Corporation

    Bill Lawrence, Chief Delivery Officer, ITEGRITI (CISSP, MS International Relations, MS Military Science, BS Computer Science), is a cybersecurity executive who previously served as the NERC VP/CSO and Senior Director of the E-ISAC. He led 40 employees in a 24/7 information sharing and analysis center to defend the North American electric grid. He has also served as a CISO for a SaaS risk assessment company protecting the data of several top oil and gas clients, and as a Commander in the U.S. Navy flying F-14 Tomcats and F/A-18 Super Hornets off aircraft carriers in combat. Over his career, he greatly expanded international grid security exercises and conferences and earned awards as a CISO as well as a leader and instructor in the U.S. Navy. Bill specializes in cybersecurity, leadership, client trust, AI, and critical infrastructure. He serves on the Houston Innovation Advisory Council, is a member of InfraGard, and helps lead the Houston Chapter of Control System Cyber Security Alliance International [(CS)2AI].

  • speaker photo
    Happy Hour
  • speaker photo
    Andreea Anderson
    IT Manager, AMNI International Petroleum

    IT Manager for AMNI International Petroleum, with over 15 years of experience in leading technical teams and leading strategic IT initiatives. With a robust background in technical architecture and design, Andreea has consistently delivered innovative solutions to enhance operational efficiency and align IT with business objectives.

    Holding a certificate from MIT in Strategic Technology Roadmapping and Innovation, Andreea brings a strategic mindset to her leadership role, ensuring that IT initiatives are in sync with organizational goals.

    Throughout her career, she has successfully overseen the overhaul of IT infrastructure for multiple clients across various industries, resulting in significant improvements in data processing time and service delivery costs.

  • speaker photo
    James Parks
    Global Cyber Security Manager, Newpark
  • speaker photo
    Manoj Tripathi, Moderator
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes