Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 14, 20259:00 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous FutureSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, May 15, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] How CISOs Can Elevate Influence and Become a Business DriverRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterFor today’s CISOs, it’s no longer enough to be just technical experts. This panel of top-level cybersecurity professionals representing the regions of Vancouver, B.C., Bozeman, and Seattle, breaks away from talking about the tired mantra of “speaking the language of the business” and instead dives into practical, real-world examples of how security leaders have successfully navigated the business landscape.
The discussion focuses on actionable strategies and tactics that have helped CISOs gain influence, secure funding, and elevate cybersecurity from a technical function to a critical business driver. Walk away with specific metrics, communication techniques, and actionable insights that have been proven to work in the real world—offering practical takeaways that can be implemented immediately. Get ready for a session that goes beyond the theory and delivers tangible answers to the challenges CISOs face today.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amStronger Together: The Power of Cyber Threat Intelligence Sharing in CybersecurityChairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)Registration Level:Conference Pass
10:15 am - 11:00 amThreat actors constantly collaborate, share tactics, and leverage intelligence to exploit vulnerabilities. Shouldn’t we be doing the same? This session will explore the critical role of threat intelligence in fostering collaboration among organizations—especially in the Greater Houston area and energy sectors. By sharing best practices, real-world strategies, and compliance considerations, we can strengthen our collective defenses and stay ahead of emerging threats. Join us to discuss how security professionals can work together to protect their organizations, industry, and community.
10:15 am[Panel] Bridging the Gap: The Role of the BISO in Modern CybersecurityHead of the Business Information Security Office (BISO), WMBISO, HumanaDirector, BISO, LeidosDirector, IT/OT Security, ConocoPhillipsRegistration Level:Conference Pass
10:15 am - 11:00 amAs cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO)—a critical yet often misunderstood role.
In this engaging panel discussion, regional BISOs will share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session will help demystify the BISO role and its importance in today’s security landscape.
Attendees will gain:
- A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
- Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
- Practical strategies for bridging the gap between security and business priorities
Join us to explore the intersection of business and security—and how mastering both can accelerate your career.
10:15 amThe Big Bad Hack: Why Attackers Are Winning and How to Fight BackGlobal VP, Defense.comRegistration Level:Open Sessions
10:15 am - 11:00 amDespite businesses investing more in security than ever, cyber attackers continue to outsmart defenses—just like the cunning villains of classic tales. So, where is it all going wrong? In this session, we’ll reveal why attackers are thriving and why traditional security strategies just aren’t strong enough to keep modern threats out.
Through real-world case studies, we’ll explore how attackers wield AI and automation like magic, breaking into systems faster than ever before. You’ll discover how your team can overcome resource constraints by implementing practical, cost-effective strategies—no enchanted swords or armies required. By the end of the session, you’ll leave with the confidence and tools needed to ensure your business lives happily ever after in cybersecurity.
10:15 amTabletop Exercises: The Fun KindRegistration Level:Open Sessions
10:15 am - 11:00 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amAI and Security Awareness: Building a Future-Ready CultureSecurity Behavior and Culture LeadRegistration Level:Conference Pass
11:10 am - 11:55 amIn the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats.
11:10 amBuilding Trusted Partnerships to Enable Secure ProductsRegistration Level:Conference Pass
11:10 am - 11:55 amIn today’s interconnected digital ecosystem, the security of any product is only as strong as its weakest link. This panel session explores the critical role of trusted partnerships in developing and maintaining secure products throughout their lifecycle.
Our distinguished panel delves into the challenges and opportunities of fostering collaborative relationships between vendors, suppliers, and customers to enhance product security. They examine how these partnerships can lead to more robust security measures, improved threat intelligence sharing, and faster response times to emerging vulnerabilities. Key topics include:
- Establishing trust in the supply chain
- Collaborative approaches to secure software development
- The role of transparency in building and maintaining trust
- Balancing intellectual property concerns with security needs
- Leveraging partnerships for more effective incident response
- Case studies of successful security-focused partnerships
11:10 amCyber Risk by the Numbers from a Cyber Insurance PerspectiveRegistration Level:Open Sessions
11:10 am - 11:55 amYou’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.
11:10 am[Panel] Improving Incident Response Through Threat Intelligence, Cloud Resilience, and AI InnovationsRegistration Level:Open Sessions
11:10 am - 11:55 amSession description to come.
12:00 pm[Lunch Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of ConflictCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThis informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.
Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.
He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmCybersecurity Challenges for Small and Medium BusinessesRegistration Level:Conference Pass
1:15 pm - 2:00 pmSmall and medium businesses (SMBs) are the backbone of the U.S. economy, generating over half of the annual GDP and employing millions of Americans. But they also face unique cybersecurity challenges that can threaten their survival and growth. In this talk, learn how to assess and mitigate the cyber risks that SMBs face, and how to implement a robust cybersecurity program with limited resources and expertise.
We cover the following topics:
- The state of SMB cybersecurity in the U.S.
- The cost and impact of cyber breaches on SMBs
- The main cyber threats and vulnerabilities that SMBs face
- The best practices and frameworks for SMB cybersecurity
- The steps to build or improve your cybersecurity program
Whether you are an IT manager, a cybersecurity professional, or a business owner, this talk is informative and practical. Walk away with a better understanding of the cyber landscape and the tools and techniques to protect your SMB from cyberattacks.
1:15 pmManaging Security and Technology After an AcquisitionRegistration Level:Conference Pass
1:15 pm - 2:00 pmSession description to come.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:Open Sessions
1:15 pm - 2:00 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pm[Panel] The Secret Potential of AI and MLRegistration Level:Open Sessions
1:15 pm - 2:00 pmArtificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.
Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.
Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.
2:00 pmNetworking BreakRegistration Level:Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmThe World's First AI Certification, ISO 42001: What We've Learned After One YearSenior Manager, SchellmanPrincipal | ISO Practice Director | AI Assessment Leader, SchellmanRegistration Level:Conference Pass
2:10 pm - 2:55 pmIn 2024, Schellman became one of the first accredited certification bodies for ISO 42001, providing invaluable insights into AI governance. Our experience revealed that ISO 42001 equips organizations with a robust framework to navigate the complex landscape of AI regulation. By establishing clear guidelines for ethical AI practices, organizations can enhance transparency, accountability, and compliance. This standard not only helps mitigate risks associated with AI deployment but also fosters trust among stakeholders. We believe that ISO 42001 is essential for organizations striving to balance innovation with regulatory demands, ultimately paving the way for responsible AI adoption in diverse sectors.
2:10 pmIntegrating Transformative OT Cybersecurity ProgramsRegistration Level:Conference Pass
2:10 pm - 2:55 pmSession description to come.
2:10 pmSocial Engineering: Training the Human FirewallRegistration Level:Open Sessions
2:10 pm - 2:55 pmPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceRegistration Level:Open Sessions
2:10 pm - 2:55 pmIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:Open Sessions
3:00 pm - 4:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Fast-Tack Funding of Your Cyber Initiatives by Focusing on Cyber ResilienceRegistration Level:Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterSession description to come.
- BitdefenderBooth: TBD
Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.
From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.
- CDWBooth: TBD
CDW Corporation is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada. A Fortune 500 company and member of the S&P 500 Index, CDW helps its customers to navigate an increasingly complex IT market and maximize return on their technology investments. For more information about CDW, please visit www.CDW.com.
Our broad array of products and services range from hardware and software to integrated IT solutions such as security, cloud, hybrid infrastructure and digital experience.
- CyberhavenBooth: TBD
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- Defense.comBooth: TBD
Defense.com is transforming the way businesses manage cyber security by allowing them to easily identify, prioritise and remediate threats.
We help to simplify and solve the cyber security challenges facing organisations, allowing teams to protect their brand and assets against today’s evolving threat landscape. Businesses of all sizes rely on our solutions to protect, detect and respond to cyber threats.
- InfraGard HoustonBooth: TBD
The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.
- ISACA HoustonBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.
- ISSA South TexasBooth: TBD
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
- NetAlly, LLCBooth: 110
Since 1993, we have been the #1 ally of network professionals worldwide. We began by making the world’s first handheld network analyzer, and have continued as industry pacesetters ever since, first as Fluke Networks® then NetScout®. Now, as an independent company, NetAlly continues to set the standard for portable network testing. We are a company founded by engineers, passionate about innovation, and motivated by one purpose: to create the best test equipment possible, designed with your success in mind. Period.
Our leading edge tools work hard to get the job done fast by…
• Simplifying the complexities of networks
• Providing instant visibility for efficient problem solving
• Enabling seamless collaboration between site personnel and remote experts.Your organization relies on you to keep their networks running. And just like you, we are reliable, practical, no-nonsense experts. We are your behind the scenes partner.
We are NetAlly.
- Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)Booth:
ONE-ISAC is dedicated to supporting cybersecurity intelligence and collaboration in the oil and natural gas sectors. Since 2014, we’ve worked to protect critical infrastructure by sharing timely threat intelligence and best practices.
- Tevora + ProcessUnityBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.
ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS Houston AffiliateBooth: TBD
Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLC
- Octavio HerreraChairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)
Octavio Herrera, a cum laude graduate from Norwich’s University MSIA program, has held a number of information security positions within Fortune 500 companies. During his 25+ years career he has led the regulatory compliance program at Alcoa’s largest business unit, managed the IT Security program for American Family Life Assurance Company of Columbus (AFLAC), served as Information Security Officer for the Houston Independent School district – the seventh largest district in the nation and the largest in Texas - an since 2013, he leads the cyber security practice for Occidental Petroleum Corporation (OXY).
Mr. Herrera has been honored as one of the “Top 40 Hispanics under 40” by Hispanic Engineer & Information Technology magazine and featured in Fortune Magazine’s March 2009 article, “How to Get a Job”.
Mr. Herrera is one of the original founding members of the Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC) where he currently serves as a chairman of the board and has been honored as a finalist for the 2024 Houston CISO ORBIE Award, a program that recognizes excellence in technology leadership for Cyber Security leaders nationwide.
- Monica Taylor BogganHead of the Business Information Security Office (BISO), WM
Monica Taylor Boggan is the Head of the Business Information Security Office (BISO) at WM, where she drives the alignment of cybersecurity with core business priorities across WM’s Digital, Corporate, Customer, Operations & Sustainability, and Healthcare Solutions divisions. Her work centers on building stronger third-party risk capabilities, leading AI security oversight, and bringing greater clarity and transparency to cyber risk.
With over 25 years in technology and deep expertise in cybersecurity, Monica has led transformative efforts in enterprise risk management, security strategy, and cyber governance. She has implemented third-party risk management systems, managed AI governance assessment programs, and designed executive-level reporting to better inform risk-based decisions.
A native Texan, Monica holds an MBA from Lamar University and maintains certifications as a CISSP, CISA, and CRISC, reflecting her commitment to both strategic leadership and technical excellence. Monica is recognized for her ability to translate complex security issues into actionable guidance for business leaders, enabling informed decision-making at every level. Her work spans the intersection of cybersecurity, innovation, and risk, with a strong focus on empowering organizations to build secure, resilient digital environments.
- Romen BrewerBISO, Humana
Romen Brewer is an accomplished Business Information Security Officer (BISO) with a track record of driving security and technology efforts to meet business demand across various industries (Oil & Gas, Software/Gaming, Financial services, and Healthcare).
As a BISO at Humana, he serves a as trusted advisor ensuring security is a business enabler while reducing risk and delivering on evolving AI/ML governance. Passionate about translating security challenges into business-enabling solutions, Romen has leveraged his unique perspective to several large-scale enterprises impacting with multiple levels of stakeholders.
‘What excites me most about cybersecurity is the constant evolution—staying ahead means continuously learning how technology innovation, business strategy, and security risk intersect in new and unexpected ways.” - Romen
- Jo JusticeDirector, BISO, Leidos
- Brittany OpeloyeDirector, IT/OT Security, ConocoPhillips
- Robert McKeeGlobal VP, Defense.com
Robert is passionate about transforming how businesses approach their cybersecurity challenges. His customer-centric approach has helped hundreds of organizations strengthen their security posture while maintaining operational efficiency. Throughout his career, he has been particularly passionate about democratizing enterprise-grade security solutions for smaller businesses.
Known for his dynamic speaking style and practical insights, Robert regularly shares his expertise on topics including sales leadership, channel strategy, and the evolving cyber security landscape. His hands-on experience working with both technical and non-technical stakeholders makes him a valuable voice in bridging the gap between security requirements and business objectives. - Melecia McLeanSecurity Behavior and Culture Lead
Melecia McLean is a Security Behavior and Culture Lead at a leading tech organization, where she applies her expertise in human risk management, social engineering, and AI to develop and enhance a proactive security culture. She leads dynamic cybersecurity awareness programs that equip individuals to protect their data, fostering a culture of vigilance, adaptability, and resilience. Melecia focuses on bridging human behavior with technology to strengthen organizational security. A passionate advocate for diversity, she served as Managing Director of Girls in Tech - Houston, championing women’s leadership in cybersecurity and STEM. Melecia is also dedicated to empowering the next generation of kids to explore cybersecurity, ensuring a future of inclusive and accessible technology.
- Panel Discussion
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Panel Discussion
- Jason LamSenior Manager, Schellman
Jason Lam is a Senior Manager with Schellman based in Austin, TX. Prior to joining Schellman in 2015, Jason worked as an Enterprise Risk Management Associate at a regional audit firm, specializing in Sarbanes-Oxley (SOX) audits and System and Organization Controls (SOC) examinations. Jason is now primarily focused on ISO certifications for organizations across various industries as well as oversight and development of Schellman's ISO practice. Jason has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security: Certified Public Accountant (CPA), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA).
- Danny ManimboPrincipal | ISO Practice Director | AI Assessment Leader, Schellman
Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
