googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, April 4, 2024
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Secure by Design: A Cyber Symphony of Unsung Heroes
    • session level icon
    speaker photo
    Chief of Staff, Integriti; CISO & Fellow Emeritus, Schlumberger
    speaker photo
    VP, Global Information & Product Security, Pindrop
    speaker photo
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    In this opening keynote, we’ll shine a spotlight on the unsung heroes of the cyber realm and their indispensable role in orchestrating a resilient defense against digital threats.

    Join us as we unveil the tales of leaders who have embraced the mission to secure our digital frontiers. Through a captivating narrative that seamlessly blends leadership prowess with superhero-esque resilience, we’ll showcase how these unsung heroes infuse security into the very core of their organizations.

    Get ready to be inspired by stories of triumph and strategies that mirror the superhero ethos, creating a cybersecurity landscape that is not just secure but fortified by the strength of its guardians. Let’s celebrate the unsung heroes of cybersecurity and set the stage for a day dedicated to innovation, collaboration, and a future that is undeniably “Secure by Design.”

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Conquering the Past: Strategies for Overcoming Technical Debt in IT and Cybersecurity
    • session level icon
    speaker photo
    Director of Cybersecurity, Avelo Airlines
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    This presentation tackles the challenge of overcoming technical debt in IT and cybersecurity, defined as outdated or underinvested technology and infrastructure. It offers leaders practical strategies to update and enhance their technological assets. The talk covers the causes, impacts, and risks of technical debt and provides systematic approaches for its identification, assessment, and prioritization. Actionable steps for addressing technical debt will be shared, focusing on resource allocation, technology selection, and fostering a culture of continuous improvement. This is vital for professionals aiming to improve their cybersecurity posture and IT efficiency, leading to a more secure and future-proof organization.
    Learn to identify and assess technical debt in IT and cybersecurity, implement strategic remediation approaches, including resource allocation and technology selection, and foster a culture of continuous improvement to update infrastructure and align with industry standards regularly.
    10:15 am
    CyberRisk Jenga: Balancing AI, Law, and Technology
    • session level icon
    speaker photo
    Cyber Liability & Data Privacy Attorney, Angelo Law Firm PLLC
    speaker photo
    Attorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon Law
    speaker photo
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & Forster
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    “CyberRisk Jenga: Balancing AI, Law, and Technology” explores the precarious intersection of artificial intelligence, legal frameworks, and technological advancements. This session delves into strategies for managing the intricate risks emerging from AI integration in cyber systems. Attendees will gain insights into harmonizing technological innovation with legal compliance in an increasingly AI-driven world.

    10:15 am
    Web Application APIs: Building a Modern Approach to Vulnerability Testing
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Web application programming interfaces (APIs) present a huge, yet still under-protected, attack surface. Although business innovation pathways are crucial for growth, they also dramatically increase the web attack surface, leaving organizations exposed to attacks that target APIs in order to directly access sensitive data and functionality.

    Legacy AppSec approaches have not necessarily kept pace with technical developments, leaving organizations struggling to reconcile multiple testing tools and processes while potentially overlooking web application APIs in their security programs. The state of AppSec maturity directly impacts the ability of organizations to innovate and optimize processes crucial to ensure effective API attack surface coverage.

    Join us for an overview of the importance of including APIs in web application security testing and how you can develop a modern approach towards vulnerability testing that covers the entire attack surface of modern web applications, from development to production. Topics include:

    • The importance of web APIs and web services in software development
    • The challenges of including APIs in application security testing, and how to overcome them
    • The security and efficiency benefits of a mature, comprehensive, and integrated AppSec program
    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Using People, Process, and Technology to Build a World Class SOC
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Session description to come.

    11:10 am
    Beyond the Breach: Navigating the Emotional Cyber Storm in Organizations
    • session level icon
    speaker photo
    InfraGard Houston Maritime Cross Sector Chief
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In this presentation, we explore the psychological aftermath of cyber attacks on organizations, highlighting the spectrum of mental health challenges faced by employees, from stress and anxiety to PTSD and depression. The discussion emphasizes the importance of addressing the strain on IT staff, the erosion of trust, the persistent fear of future attacks, and the impact on personal identity and self-esteem. By advocating for a holistic approach to cyber security that includes psychological support and preventive strategies, the presentation underscores the need for resilience-building measures and a blame-free culture to help organizations and their workforce navigate the complex emotional landscape post-attack, ensuring both technological and psychological recovery.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Sr. Solutions Architect, Syxsense
    speaker photo
    Co-Founder & CEO, Zafran Security
    speaker photo
    Chief Operating Officer, Envision
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Selling Security Awareness to Your Employees
    • session level icon
    speaker photo
    VP, Information Security, First Community Credit Union
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    This presentation is not a “how-to” guide on developing an effective security awareness program, but an exploration of ideas rooted in marketing concepts security professionals can utilize to create or enhance their own programs. Topics will range through a variety of concepts but some of the highlights will be the need for “branding” an organization’s program to establish an identity with the employees, conveying security operations role within the organization, ways to improve your employee’s participation in the security awareness program, what’s in the program for your employees, and useful metrics to measure participation in your program. The presentation will outline ways security practitioners can convey their security messages to employees in unique and fun ways that will excite and improve employee involvement with the program utilizing marketing concepts.

    1:15 pm
    Navigating the Digital Abyss: Unmasking the True Cost of Ransom vs. Cyber Insurance
    • session level icon
    speaker photo
    VP, Cyber Practice Leader, Cadence Insurance
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    This session aims to explore the advantages of cyber insurance and its increasing relevance in today’s rapidly evolving technological landscape. Cybercrime has become one of the most significant risks faced by businesses globally, with the cost of cyber-attacks and data breaches escalating year on year. The advent of ransomware has only heightened this threat, with statistics revealing that ransomware attacks increased by 485% in 2020 alone.

    The cost of ransomware is also rising, with some attacks costing in the region of tens of millions of dollars. Cyber insurance is an excellent form of both risk management and financial risk transfer by providing businesses with an essential safety net in the event of a cyber-attack, offering financial support and assistance to cover the costs incurred by the attack through business interruption, data recovery, third-party liability, and reputational damage costs.

    Additionally, cyber insurance providers often provide additional risk management services such as non-intrusive vulnerability assessments, tabletops, and incident response planning to help businesses identify potential risks and implement preventative measures to reduce the likelihood of a cyber-attack. With the escalating cost and frequency of cyber-attacks, having cyber insurance is becoming an essential component of any effective cybersecurity strategy- it provides businesses with financial protection and additional risk management services to help minimize the impact of a cyber-attack.

    As such, it is crucial that businesses give serious consideration to the advantages of cyber insurance and explore their options for this form of protection.

    In this session, we’ll delve into the complex interplay between cyber insurance policies and the rising threat of ransomware attacks. Join us as we explore the nuances, dispel insurance myths, and uncover strategies to safeguard organizations in today’s ever-evolving digital landscape.

    Key Points:

    • Advantages and disadvantages of having cyber insurance
    • What does cyber insurance cover vs. not cover?
    • Increasing cost of ransomware and what that means for companies
    • Detailing how cyber insurance is a great form of holistic enterprise risk management and financial risk transfer.
    1:15 pm
    [Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial Intelligence
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Social Engineering: Training the Human Firewall
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    2:10 pm
    Automated Application Security Posture Management at SLB
    • session level icon
    speaker photo
    Cybersecurity Architect, Schlumberger (SLB)
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Learn how automated application security enables product teams in SLB to continuously deliver secure products to clients. As product teams release every few hours or days, security compliance needs to be automated as well. This presentation will showcase the DevSecOps process used at SLB to automate security testing and security compliance. I will elaborate on the reporting requirements that enable product and security teams to review existing risks, vulnerabilities, and possible mitigations. I will elaborate on the application security risk matrix which can be used in agile development to secure continuous releases.

    2:10 pm
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote] The Successes and Failures In Cybersecurity
    • session level icon
    speaker photo
    Global Cyber Security Manager, Newpark
    speaker photo
    VP, Global Information & Product Security, Pindrop
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    CISOs learn from their successes and failures, sometimes more so from their failures than successes. This session is a safe space to share the strategies, successes and failures in a constructive and thought provoking discussion. Learn from the CISOs with diverse experiences and specializations, across SaaS, Cloud, IT and OT,  as they share what to do and especially what not to do in cybersecurity.

Exhibitors
  • Blumira
    Booth: TBD

    Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.

    Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

  • D3 Security
    Booth: TBD

    D3 is building up MSSPs and SecOps teams by offering the most innovative, most reliable security automation platform — no matter the stack or scale required.

  • Envision Technology Advisors
    Booth: TBD

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • InfraGard Houston
    Booth: TBD

    The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.

  • ISSA South Texas
    Booth: TBD

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • Rapid7
    Booth: TBD

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Savvy Security
    Booth: TBD

    Savvy is a software development company that engages in cybersecurity.

  • Skybox Security
    Booth: TBD

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Sprocket Security
    Booth: TBD

    Sprocket Security was founded to improve the way we approach cybersecurity. Currently the industry performs services in a timeboxed, or point-in-time approach. We think this is fundamentally flawed. We protect your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

  • Syxsense
    Booth: TBD

    Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS Houston Affiliate
    Booth: TBD

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

  • Zafran Security
    Booth: TBD

    Zafran Security

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Mario Chiock
    Chief of Staff, Integriti; CISO & Fellow Emeritus, Schlumberger

    Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community.

    Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating

    Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. In 2018 was awarded the South Central Region InfraGard Award for “INMA Leadership!”.

    Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member.

    Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. Co-Author of "Navigating the Digital Age, Second Edition."

  • speaker photo
    Manoj Tripathi
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

  • speaker photo
    Dd (Catharina) Budiharto, Moderator
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
  • speaker photo
    David Sledge
    Director of Cybersecurity, Avelo Airlines

    David Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking engagements include keynote speaker and panelist. He is a current ISACA – Greater Houston Chapter Board Member and active member of SIM Houston, ISSA South Texas, OWASP Austin, and ISC2 Austin. A cybersecurity advisory board member at multiple universities and is recognized as an ambassador, mentor, and advocate in the cybersecurity industry.

  • speaker photo
    Lisa Angelo
    Cyber Liability & Data Privacy Attorney, Angelo Law Firm PLLC

    Lisa M. Angelo has a law practice focused on cyber liability & data privacy. With over a decade of experience, Lisa is one of the first attorneys in Texas to earn a board certification in privacy law, a credential issued from the International Association of Privacy Law Professionals and recognized by the State Bar of Texas. In addition, Lisa has earned two internationally recognized certifications in privacy: she is a Certified Information Privacy Manager (CIPM) and a Certified Information Privacy Professional (CIPP/US).

    Lisa advises Fortune 500 businesses in big tech, social media, insurance, retail, and other industries on global data privacy, AI regulation, cyber insurance, technology contracts, intellectual property, and other matters related to technology. In recent months, Lisa was invited to serve on the AI Task Force Committee responsible for making recommendations to the Texas State Bar on AI in the practice of law. Lisa also serves as the Chief of the FBI’s InfraGard Houston Chapter – Legal Cross Sector Council, an initiative for the private and public sectors to share information about cyber risk. Previously, Lisa has served as a member of the State Bar Business Law Section’s Blockchain Committee and an elected council member for the State Bar of Texas Computer & Technology Section. Recognized for her professional achievements, Lisa’s peers named her a Texas Super Lawyers’ Rising Star in 2019-2023.

  • speaker photo
    Candace McCaddon
    Attorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon Law
  • speaker photo
    Violet Sullivan, Moderator
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & Forster

    Violet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.

    Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.

    As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.

    As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.

  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Chris Wolski
    InfraGard Houston Maritime Cross Sector Chief

    Chris Wolski is a distinguished information security expert, former Chief Information Security Officer for a Fortune 1000 company, and now provides fractional information security leadership for Applied Security Convergence. He is currently on the board of ISSA South Texas and is dual-hatted as the Maritime Cross Sector Chief for the Houston InfraGard and Area Maritime Security Committee (AMSC) Cyber Subcommittee Chair. He is an award-winning transformational information security leader with over two decades of cross-industry cybersecurity expertise. Distinguished track record of architecting comprehensive resilient cybersecurity strategies and building and developing world-class security teams. Fluent in bridging communication gaps, from frontline staff to boardroom dialogues, ensuring robust, organization-wide security alignment.

    His rich career includes leading security at CSAT Solutions and the Port of Houston Authority, where he earned a U.S. Coast Guard Meritorious Service Citation. His cybersecurity expertise cuts across critical infrastructure, manufacturing, retail, healthcare, and government sectors. As a retired U.S. Navy Chief Petty Officer, he has managed information security operations involving multinational organizations. He supervised an expedited threat communication system for 191 Houston Ship Channel Security District organizations. Chris holds an MBA and a Bachelor of Science in Cybersecurity from the University of Maryland Global Campus.

  • speaker photo
    Jon Cassell
    Sr. Solutions Architect, Syxsense

    Jon Cassell is currently a Senior Solutions Architect at Syxsense and has been working in the IT and Infrastructure industries for the last 15 years. Before working at Syxsense, Jon was an IT Manager for a large financial services firm and has a background in Accounting and Tax consultation. He currently holds an MCSA in Server Infrastructure, A+, Network+, Security+, and Server+ certifications. 

  • speaker photo
    Sanaz Yashar
    Co-Founder & CEO, Zafran Security
  • speaker photo
    Jason Albuquerque
    Chief Operating Officer, Envision

    With more than 20 years of experience in the technology field, Jason has served in numerous leadership role in his career leading to the Chief Operating Officer position with Envision.

    Jason takes pride in leading the charge, and in building a culture that is innovative and secure by design for the business and its clients. He brings the strategic insight, industry knowledge, and agility that today’s industry requires to effectively respond to the rapidly changing technology, threat, risk, and business landscapes.

    He has been the recipient of several prestigious recognitions and awards in technology and leadership, including being named a “2021 Top Cybersecurity Leader" by Security Magazine partnered with (ISC), Rhode Island’s 40 under Forty Award, and Rhode Island’s Tech 10 Award. He is also a seven-time National Public Technology Institute Solutions Award winner.

    Jason currently co-hosts the Business Security Weekly podcast and serves on Congressman Langevin’s (Congressional Cybersecurity Caucus co-chair) Cybersecurity Advisory Committee. He also serves on the Tech Collective Board of Directors and the Rhode Island Joint Cyber Task Force.

  • speaker photo
    Panel Discussion
  • speaker photo
    Bryan Perkola
    VP, Information Security, First Community Credit Union

    Bryan Perkola, CISSP, CISM, is a passionate cybersecurity professional and IT veteran with over thirty years of experience primarily in organizations associated with manufacturing, retail, and finance. Bryan holds multiple bachelor's degrees from the University of Houston in Marketing and Organizational Behavior and Management and has received his master’s degree in Cybersecurity and Information Assurance from Western Governor’s University in addition to numerous industry certifications. Bryan’s work experience has primarily been involved with small to mid-sized organizations where he was intimately involved with multiple disciplines such as marketing and human resources that has provided him some unique perspectives and understandings for developing creative and effective security awareness programs that promote a strong cybersecurity culture within the organization.

  • speaker photo
    Gabrielle Bryant
    VP, Cyber Practice Leader, Cadence Insurance

    As the Cyber Practice Leader, Gabrielle Bryant focuses on the strategic and operational vision regarding how cyber exposures will impact our clients as well as researching methodologies to mitigate emerging cyber threats and their intersectionality with other lines of coverage.

    Before becoming Cyber Practice Leader, Gabrielle Bryant was a Cybersecurity Advisory Consultant responsible for delivering targeted technical assessments and conducting cybersecurity risk assessments using industry standard frameworks.

    Gabrielle held the position as Senior Cyber Broker with Aon’s Cyber Solutions Southwest team, which provided her with a strong foundation in Cyber and Professional Liability risks and was also an Account Executive/Broker with the Aon Ascent team, which focuses on small to medium sized business.

    Gabrielle earned a M.Sc. from Saint Mary's University of MN and a Bachelor in Business Administration degree in Risk Management and Insurance from Baylor University.

  • speaker photo
    Panel Discussion
  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Akshit Goel
    Cybersecurity Architect, Schlumberger (SLB)

    Akshit Goel is a Cybersecurity Architect at SLB where he leads a team of security engineers to deliver secure software solutions to the Energy industry. He helps the teams design, build, and test security solutions and tools. His focus areas are Application Security, Cloud Security, and DevSecOps. He is an automation enthusiast and pursues the mission of implementing DevSecOps and automated security testing across the organization. He assists software development teams in threat assessment, cyber risk evaluation, and reduction and vulnerability management.

  • speaker photo
    Happy Hour
  • speaker photo
    James Parks
    Global Cyber Security Manager, Newpark
  • speaker photo
    Manoj Tripathi, Moderator
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Best practices & solutions, straight from the source

Join your local cybersecurity community for learning and professional growth!