googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 14, 2025
    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Elm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Live Oak A

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, May 15, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Rightsizing InfoSec: Finding the Balance Between Risk, Budget, and Impact
    speaker photo
    VP, Global Information & Product Security, Pindrop
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Live Oak B

    In an era of tightening budgets and expanding threats, how do CISOs ensure their security programs are neither overbuilt nor under-resourced? This closed-door roundtable brings together security leaders to share how they’ve approached “rightsizing” their InfoSec programs—aligning risk tolerance, business objectives, and available resources. From rationalizing tools and staffing to communicating trade-offs to the board, join your peers for a candid conversation on doing more with what you’ve got—while keeping security outcomes front and center.

     

    8:00 am
    WiCyS Houston Affiliate Meeting: Come and Meet Your New 2025 Board
    • session level icon
    Open to all attendees
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Pecan

    The WiCyS Houston Affiliate is hosting a meet and greet with your new 2025 Board. We are excited to share with you what to look out for and how to get plugged in to grow your career within the cybersecurity industry. 

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Cross-Industry CISO Perspectives: Securing Critical Systems in a World of Complex Cyber Risks
    • session level icon
    speaker photo
    CISO, JB Poindexter & Co.
    speaker photo
    VP of IT Infrastructure & Cybersecurity, Crane Worldwide Logistics
    speaker photo
    Chairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)
    speaker photo
    Principal, CI5O Advisory Services LLC
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Cybersecurity is no longer a one-size-fits-all challenge. In this opening keynote, a panel of CISOs from diverse industries will share their unique strategies for protecting their organizations in an increasingly complex cyber risk environment.

    With each industry facing distinct challenges, from regulatory hurdles to advanced threat actors, this session will explore how CISOs approach risk management, incident response, and resilience.

    Join us for an engaging discussion on how industry-specific insights, collaboration, and innovation are shaping the future of cybersecurity and fortifying critical infrastructure in the face of new and emerging risks.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Bridging the Gap: The Role of the BISO in Modern Cybersecurity
    • session level icon
    speaker photo
    Head of the Business Information Security Office (BISO), WM
    speaker photo
    BISO, Humana
    speaker photo
    Director, BISO, Leidos
    speaker photo
    Director, IT/OT Security, ConocoPhillips
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Pecan

    As cybersecurity continues to evolve, so does the need for professionals who can seamlessly connect security initiatives with business objectives. Enter the Business Information Security Officer (BISO)—a critical yet often misunderstood role.

    In this engaging panel discussion, regional BISOs will share insights into their responsibilities, challenges, and the strategic impact they have within their organizations. Whether you’re a technical professional looking to advance your career or an executive seeking to understand the business side of cybersecurity, this session will help demystify the BISO role and its importance in today’s security landscape.

    Attendees will gain:

    • A clear understanding of what a BISO does and how they differ from CISOs and other security leaders
    • Insights into how technical professionals can develop the business acumen necessary to transition into leadership roles
    • Practical strategies for bridging the gap between security and business priorities

    Join us to explore the intersection of business and security—and how mastering both can accelerate your career.

    10:15 am
    Locking the Future: Why Data Security Is the Key to Trustworthy AI
    • session level icon
    speaker photo
    Data Strategy and Data Information Architect, Bank of America
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Elm

    As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

    10:15 am
    The Big Bad Hack: Why Attackers Are Winning and How to Fight Back
    • session level icon
    speaker photo
    Global VP, Defense.com
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Live Oak A

    Despite businesses investing more in security than ever, cyber attackers continue to outsmart defenses—just like the cunning villains of classic tales. So, where is it all going wrong? In this session, we’ll reveal why attackers are thriving and why traditional security strategies just aren’t strong enough to keep modern threats out.

    Through real-world case studies, we’ll explore how attackers wield AI and automation like magic, breaking into systems faster than ever before. You’ll discover how your team can overcome resource constraints by implementing practical, cost-effective strategies—no enchanted swords or armies required. By the end of the session, you’ll leave with the confidence and tools needed to ensure your business lives happily ever after in cybersecurity.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    AI and Security Awareness: Building a Future-Ready Culture
    • session level icon
    speaker photo
    Security Behavior and Culture Lead
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Elm

    In the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats.

     

    11:10 am
    Hacking My Way to a Lamborghini: How to Stop Cybercriminals Making Millions
    • session level icon
    speaker photo
    Commercial Director, Searchlight Cyber
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Live Oak A

    Security teams are in an adversarial battle with cybercriminals. On one side, the hacker is working towards their objective: making a fortune. On the other, security professionals are trying to stop hackers making that fortune at the expense of their organization. This presentation uses real-life examples from the dark web to demonstrate the tactics cybercriminals use to monetize their attacks. The talk demonstrates how hackers can be identified every step of the way if organizations are proactive in gathering threat intelligence and how this can be applied to defenses. Walk away knowing how threat intelligence can be used to stop hackers executing on their objectives.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Sr. Solutions Architect, US, Bitdefender
    speaker photo
    CISO, Symmetry Systems
    speaker photo
    Team Lead – IRSM – Cybersecurity Engineering & Innovation, Chevron
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Pecan

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of Conflict
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    This informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.

    Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.

    He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Navigating Budget Pressures Amid Trade Wars and Tariffs
    speaker photo
    Founder & CEO, Cyber Point Advisory
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Live Oak B
    As the global trade landscape evolves, tariffs and international trade tensions are being felt across industries. For cybersecurity leaders, these economic shifts are not just a matter of cost increases. They represent a fundamental challenge to budget allocation and resource prioritization.
    This Advisory Council discussion will explore how the ongoing trade wars and tariff policies influence cybersecurity funding, the risk of underinvestment in critical areas, and strategies to maintain robust defense postures despite financial pressures. Join us for an in-depth conversation with industry experts on navigating this complex environment, balancing financial constraints with the need for enhanced security.
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    How to Write Your Own Security Happily Ever After
    • session level icon
    speaker photo
    Information Security Awareness Lead, Brown & Brown Insurance
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Live Oak A

    Attackers try to exploit our technologies, processes, and people to breach our systems and steal data. We educate our technology teams, train elevated access teams in secure processes, and keep users informed on emerging threats. That’s easier said than done. Most security teams do not include professional educators or communication specialists. We tend to sprinkle bits of information, or we push everything to everyone all at once leaving it to the user to decide what to view. 

    How do we know when we’ve said enough? Is it possible to share too much? (Psst, yes, it is.) Experts recommend using stories, but what makes a good story and what’s the best way to deliver it so the message sticks? How do we balance customization with available resources? Attendees will learn a new framework to create and structure content for each of your audiences so security awareness and training will have the greatest impact with the least amount of security team time. This framework will ensure all areas you need to educate are covered and the right amount of information is shared.

    1:15 pm
    Digital Letters of Marque and Reprisal: Enlisting Cybersecurity’s Privateers in Defense of Critical Infrastructure
    • session level icon
    speaker photo
    Director, Global Cybersecurity Program, University of St. Thomas
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Elm
    In the age of sail, Letters of Marque and Reprisal were issued by governments to authorize privateers to wage war against pirates and the hostile nations that supported them. With the explosive growth of cybercriminal activity and the increasing nexus between these actors and state-sponsored adversaries, it is time to consider a modern equivalent—a digital Letter of Marque and Reprisal.
    Drawing an analogy to the age of discovery when great powers (England, Spain, France, Portugal, and the Netherlands) competed for control of sea lanes, piracy emerged as an inevitable consequence of the wealth flowing through global trade routes. With merchant fleets growing too large to be protected solely by national navies, privateers were given the legal and financial incentive to serve as force multipliers.
    Fast forward to 2025, and the digital ecosystem is beset with modern-day pirates: cybercriminal gangs and their state-sponsored allies. As national infrastructure becomes increasingly vulnerable to these cyber threats, the need for a collective defense effort is paramount. Just as privateers once played a crucial role in defending maritime trade, it’s time for the cybersecurity community to be enlisted in the protection of our nation’s most critical assets.
    In this session, we will explore how such a system could work, drawing parallels to the financial incentives that once motivated privateers, and consider the role that the private sector cybersecurity community could play in safeguarding our critical infrastructure. Though the proposal may be tongue-in-cheek, the conversation will address a serious question: What part can the cybersecurity industry play in defending our nation against the modern-day threats that face us today? Join us for this thought-provoking discussion and offer your own insights into the evolving role of cybersecurity in national defense.
    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Executive Cybersecurity Strategist, Global Security Strategy Office, CDW
    speaker photo
    VP, Field Engineering, Cyberhaven
    speaker photo
    CISO, Affineon Health
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Pecan

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    The World's First AI Certification, ISO 42001: What We've Learned After One Year
    • session level icon
    speaker photo
    Senior Manager, Schellman
    speaker photo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Elm

    In 2024, Schellman became one of the first accredited certification bodies for ISO 42001, providing invaluable insights into AI governance. Our experience revealed that ISO 42001 equips organizations with a robust framework to navigate the complex landscape of AI regulation. By establishing clear guidelines for ethical AI practices, organizations can enhance transparency, accountability, and compliance. This standard not only helps mitigate risks associated with AI deployment but also fosters trust among stakeholders. We believe that ISO 42001 is essential for organizations striving to balance innovation with regulatory demands, ultimately paving the way for responsible AI adoption in diverse sectors.

    2:10 pm
    Stronger Together: The Power of Cyber Threat Intelligence Sharing in Cybersecurity
    • session level icon
    speaker photo
    Chairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Pecan

    Threat actors constantly collaborate, share tactics, and leverage intelligence to exploit vulnerabilities. Shouldn’t we be doing the same? This session will explore the critical role of threat intelligence in fostering collaboration among organizations—especially in the Greater Houston area and energy sectors. By sharing best practices, real-world strategies, and compliance considerations, we can strengthen our collective defenses and stay ahead of emerging threats. Join us to discuss how security professionals can work together to protect their organizations, industry, and community.

    2:10 pm
    Managing Stress and Preserving Sanity: Mental Health Strategies for High-Stress Jobs
    • session level icon
    speaker photo
    Founder & Managing Attorney, Candace McCaddon Law, PLLC
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Live Oak A
    The pressure can be overwhelming in high-stress jobs, especially in cybersecurity. This session will explore the personal journey of a seasoned professional who faced the ultimate burnout and found a path to mental wellness. With a background in managing high-stakes situations and balancing the demands of a challenging career, Candace will share practical techniques for nervous system regulation.
    Through a deep dive into scientifically backed methods, attendees will learn how these strategies improve mental health and enhance performance and balance in both professional and personal life. Join us for a candid discussion about the importance of mental well-being in high-stress environments and take away tools you can apply immediately to maintain your sanity and optimize your performance in any crisis.
    2:55 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:55 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:15 pm
    [Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in Cybersecurity
    • session level icon
    speaker photo
    Deputy CISO, ENGIE North America
    speaker photo
    CISO & Director, Healthcare Technology Management, Texas Children's Hospital
    speaker photo
    VP, Global Information & Product Security, Pindrop
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    As the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.

    Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.

    4:00 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • Attaxion
    Booth: 230

    Attaxion enables you to uncover all external assets and vulnerabilities before attackers exploit them. Map your entire attack surface and collect laser-focused, actionable vulnerability intelligence to guide and orchestrate remediation steps.

  • Bitdefender
    Booth: 320

    Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert* for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.  ​

  • CDW
    Booth: 100

    CDW Corporation is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada. A Fortune 500 company and member of the S&P 500 Index, CDW helps its customers to navigate an increasingly complex IT market and maximize return on their technology investments. For more information about CDW, please visit  www.CDW.com.

    Our broad array of products and services range from hardware and software to integrated IT solutions such as security, cloud, hybrid infrastructure and digital experience.

  • Cyberhaven
    Booth: 300

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cyera
    Booth: 350

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Defense.com
    Booth: 260

    Defense.com is transforming the way businesses manage cyber security by allowing them to easily identify, prioritise and remediate threats.

    We help to simplify and solve the cyber security challenges facing organisations, allowing teams to protect their brand and assets against today’s evolving threat landscape. Businesses of all sizes rely on our solutions to protect, detect and respond to cyber threats.

  • Digital Hands
    Booth: 210

    Digital Hands is how you finally get MDR with the flexibility, fine-tuning, and support needed to make it work in your specific environment. We call it Real-World MDR.

    Too many companies get excited about the promise of MDR, only to be disappointed by MDR’s missing pieces. Where are the custom playbooks? The expert guidance? Firewall management? How do you handle the sheer volume of alerts? Why won’t this play nice with your tech stack? And on and on it goes. Meanwhile, the bad actors are becoming more and more sophisticated with AI and automation. So, you’ve got to think fast, act fast, and flex fast. That’s why organizations with some of the most sensitive data of all – such as hospitals, financial institutions, law firms, and government agencies – continue to give us industry-leading satisfaction sentiments year after year after year.

  • Fortinet
    Booth: TBD

    Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.

  • InfraGard Houston
    Booth: 410

    The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.

  • ISACA Houston
    Booth: 420

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.

  • Houston ISC2 Chapter
    Booth: 400

    Houston ISC2 is a dedicated non-profit chapter of ISC2, the world’s leading cybersecurity professional association. We strive to create a safe and secure cyber world by supporting our members through valuable networking opportunities, educational resources, and career advancements. Based in Houston, we actively promote cybersecurity awareness within the community and empower individuals to enhance their skills and knowledge in this critical field.

  • ISSA South Texas
    Booth: 130

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • NetAlly, LLC
    Booth: 110

    Since 1993, we have been the #1 ally of network professionals worldwide. We began by making the world’s first handheld network analyzer, and have continued as industry pacesetters ever since, first as Fluke Networks® then NetScout®. Now, as an independent company, NetAlly continues to set the standard for portable network testing. We are a company founded by engineers, passionate about innovation, and motivated by one purpose: to create the best test equipment possible, designed with your success in mind. Period.

    Our leading edge tools work hard to get the job done fast by…
    • Simplifying the complexities of networks
    • Providing instant visibility for efficient problem solving
    • Enabling seamless collaboration between site personnel and remote experts.

    Your organization relies on you to keep their networks running. And just like you, we are reliable, practical, no-nonsense experts. We are your behind the scenes partner.

    We are NetAlly.

  • Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)
    Booth: N/A

    ONE-ISAC is dedicated to supporting cybersecurity intelligence and collaboration in the oil and natural gas sectors. Since 2014, we’ve worked to protect critical infrastructure by sharing timely threat intelligence and best practices.

  • Ping Identity
    Booth: 240

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • Searchlight Cyber
    Booth: 365

    We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity.

    Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research.

    Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.

  • Silverfort
    Booth: 220

    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.

  • Symmetry Systems
    Booth: 325

    Symmetry is the Data+AI Security Company. We safeguard data at scale, detect threats, ensure compliance & reduce AI risks, so you can Innovate with Confidence.

    Our platform is engineered specifically to address modern data security and privacy challenges at scale from the data out, providing organizations the ability to innovate with confidence. With total visibility into what data you have, where it lives, who can access it, and how it’s being used, Symmetry safeguards your organization’s data from misuse, insider threats, and cybercriminals, as well as unintended exposure of sensitive IP and personal information through use of generative AI technologies.

  • Tevora + ProcessUnity
    Booth: 120

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.

    ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.

  • ThreatLocker
    Booth: 250

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Trustmi
    Booth: 310

    Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7. Our AI-driven platform instantly detects suspicious activity and human errors by continuously analyzing millions of data points, including vendor actions, emails, files, and payment details. Trustmi helps you accelerate digital transformation by reducing manual verification efforts and enhancing the efficiency and security of your payment processes, ensuring a smarter, faster approach to fraud prevention.

  • WiCyS Houston Affiliate
    Booth: 360

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Rob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program and other cyber risk services offered by CRO.

    Rob graduated with honors from Washington State University with a Bachelors in Management Information Systems and went on to work for a local tech startup in the greater Seattle area. Before joining CRO, Rob interned at a local cyber testing facility based in Bellevue, Washington, and gained his first exposure to the fast-paced world of cybersecurity. His interest in cybersecurity has only increased as the cyber landscape continues to evolve. He looks forward to helping companies manage these constantly changing risks. Outside of work, Rob enjoys exploring the amazing state of Washington with his family.

  • speaker photo
    Manoj Tripathi, Moderator
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

  • speaker photo
    John Barrow
    CISO, JB Poindexter & Co.

    An accomplished IT Security leader, John has more than 20 years’ experience spearheading the formation and optimization of several exceptional cybersecurity programs and teams across multiple industries, to include Gaming/Entertainment, Healthcare, and Manufacturing.

    John serves as the CISO for JB Poindexter & Co. He leads the cybersecurity program and mission to protect the organization against cyber threats while supporting core business and operational objectives.

  • speaker photo
    Jerich Beason
    CISO, WM
  • speaker photo
    Marc Crudgington
    VP of IT Infrastructure & Cybersecurity, Crane Worldwide Logistics
  • speaker photo
    Octavio Herrera
    Chairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)

    Octavio Herrera, a cum laude graduate from Norwich’s University MSIA program, has held a number of information security positions within Fortune 500 companies. During his 25+ years career he has led the regulatory compliance program at Alcoa’s largest business unit, managed the IT Security program for American Family Life Assurance Company of Columbus (AFLAC), served as Information Security Officer for the Houston Independent School district – the seventh largest district in the nation and the largest in Texas - an since 2013, he leads the cyber security practice for Occidental Petroleum Corporation (OXY).

    Mr. Herrera has been honored as one of the “Top 40 Hispanics under 40” by Hispanic Engineer & Information Technology magazine and featured in Fortune Magazine’s March 2009 article, “How to Get a Job”.

    Mr. Herrera is one of the original founding members of the Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC) where he currently serves as a chairman of the board and has been honored as a finalist for the 2024 Houston CISO ORBIE Award, a program that recognizes excellence in technology leadership for Cyber Security leaders nationwide.

  • speaker photo
    Al Lindseth, Moderator
    Principal, CI5O Advisory Services LLC

    Highly effective and successful senior executive with 25 years in the energy industry. Experience and knowledge spans different markets, products, business models and disciplines.
    Proven track record of:
    • Driving resolution of the top challenges facing different groups, companies or individuals, whether as a member of its management team or as an outside expert
    • Acting as change agent to effect turnaround situations and solve critical problems
    • Balancing between an entrepreneurial culture and the discipline to achieve the high standards and controls of a large public company
    • Doing more with less (PAALP ranked #5 in Forbes 500 in revenues/employee in 2009)

  • speaker photo
    Monica Taylor Boggan
    Head of the Business Information Security Office (BISO), WM

    Monica Taylor Boggan is the Head of the Business Information Security Office (BISO) at WM, where she drives the alignment of cybersecurity with core business priorities across WM’s Digital, Corporate, Customer, Operations & Sustainability, and Healthcare Solutions divisions. Her work centers on building stronger third-party risk capabilities, leading AI security oversight, and bringing greater clarity and transparency to cyber risk.

    With over 25 years in technology and deep expertise in cybersecurity, Monica has led transformative efforts in enterprise risk management, security strategy, and cyber governance. She has implemented third-party risk management systems, managed AI governance assessment programs, and designed executive-level reporting to better inform risk-based decisions.

    A native Texan, Monica holds an MBA from Lamar University and maintains certifications as a CISSP, CISA, and CRISC, reflecting her commitment to both strategic leadership and technical excellence. Monica is recognized for her ability to translate complex security issues into actionable guidance for business leaders, enabling informed decision-making at every level. Her work spans the intersection of cybersecurity, innovation, and risk, with a strong focus on empowering organizations to build secure, resilient digital environments.

  • speaker photo
    Romen Brewer
    BISO, Humana

    Romen Brewer is an accomplished Business Information Security Officer (BISO) with a track record of driving security and technology efforts to meet business demand across various industries (Oil & Gas, Software/Gaming, Financial services, and Healthcare).

    As a BISO at Humana, he serves a as trusted advisor ensuring security is a business enabler while reducing risk and delivering on evolving AI/ML governance. Passionate about translating security challenges into business-enabling solutions, Romen has leveraged his unique perspective to several large-scale enterprises impacting with multiple levels of stakeholders.

    ‘What excites me most about cybersecurity is the constant evolution—staying ahead means continuously learning how technology innovation, business strategy, and security risk intersect in new and unexpected ways.” - Romen

  • speaker photo
    Jo Justice
    Director, BISO, Leidos
  • speaker photo
    Brittany Opeloye
    Director, IT/OT Security, ConocoPhillips
  • speaker photo
    Jennifer Fite
    Data Strategy and Data Information Architect, Bank of America

    Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.

  • speaker photo
    Robert McKee
    Global VP, Defense.com

    Robert is passionate about transforming how businesses approach their cybersecurity challenges. His customer-centric approach has helped hundreds of organizations strengthen their security posture while maintaining operational efficiency. Throughout his career, he has been particularly passionate about democratizing enterprise-grade security solutions for smaller businesses.
    Known for his dynamic speaking style and practical insights, Robert regularly shares his expertise on topics including sales leadership, channel strategy, and the evolving cyber security landscape. His hands-on experience working with both technical and non-technical stakeholders makes him a valuable voice in bridging the gap between security requirements and business objectives.

  • speaker photo
    Melecia McLean
    Security Behavior and Culture Lead

    Melecia McLean is a Security Behavior and Culture Lead at a leading tech organization, where she applies her expertise in human risk management, social engineering, and AI to develop and enhance a proactive security culture. She leads dynamic cybersecurity awareness programs that equip individuals to protect their data, fostering a culture of vigilance, adaptability, and resilience. Melecia focuses on bridging human behavior with technology to strengthen organizational security. A passionate advocate for diversity, she served as Managing Director of Girls in Tech - Houston, championing women’s leadership in cybersecurity and STEM. Melecia is also dedicated to empowering the next generation of kids to explore cybersecurity, ensuring a future of inclusive and accessible technology.

  • speaker photo
    Jon Scott
    Commercial Director, Searchlight Cyber
  • speaker photo
    Andrei Ionescu
    Sr. Solutions Architect, US, Bitdefender

    Andrei has been in cybersecurity for 20 years; the last 13 he has been working for Bitdefender. In his day to day role, he helps enterprises to adopt Bitdefender inside their security stack while ensuring a smooth transition to our tools and services.

  • speaker photo
    Anand Singh
    CISO, Symmetry Systems

    Dr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currently Chief Information Security Officer (CISO) at Symmetry Systems. Prior to this role, he was the CISO at Alkami Technology and Caliber Home Loans. He has also served in leadership functions at UnitedHealth Group and Target.

    Dr. Singh is an adjunct faculty at Mitchell Hamline School of Law. He has a PhD in Computer Science from University of Minnesota and M.S. in Computer Science from Purdue University. Dr. Singh also holds CISM and CISSP professional certifications. He is an accomplished speaker and author with several notable keynotes and publications under his belt.

  • speaker photo
    Ashish Shah, Moderator
    Team Lead – IRSM – Cybersecurity Engineering & Innovation, Chevron
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Dd (Catharina) Budiharto, Moderator
    Founder & CEO, Cyber Point Advisory
  • speaker photo
    Dr. Paul Berryman
    Information Security Awareness Lead, Brown & Brown Insurance

    Paul has a passion for security, education, and bad puns, bringing them together whenever possible. He has spent the last 2 decades protecting people from the usual suspects of hackers, criminals, and bored teenagers and is focused on teaching how to connect with people through storytelling and energizing presentations to change behaviors. He enables organizations to train their users and reduce the element of human risk.

    Prior to working in security and education, Paul had 6 years of swashbuckling adventures with the US Navy. He’s a big fan of colleges, having attended 7 different ones. He most recently earned a doctorate in education and teaches technology content to high schoolers, college students, and adults. He's figured out that strong security starts with teaching how to behave online. It isn’t rocket science, but just in case he has a degree in that, too.

  • speaker photo
    Eric C. Botts
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.

    Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).

  • speaker photo
    Paul Kinder
    Executive Cybersecurity Strategist, Global Security Strategy Office, CDW

    Paul Kinder is a distinguished member of CDW’s Global Security Strategy Office (GSSO), where he provides advanced security consulting and enhances the solutions portfolio for CDW’s cybersecurity, data privacy, and Artificial Intelligence (AI) services. As a recognized speaker on topics ranging from AI to cybersecurity maturity, Paul has delivered impactful presentations within CDW, to customers, and to government organizations. He collaborates closely with customers and internal stakeholders to develop and deliver effective solutions and exceptional value.
    With experience in building and supporting data privacy and cybersecurity teams and developing and expanding cybersecurity and risk management programs for diverse clients, Paul has successfully led and executed multi-year cybersecurity projects across various industries.

    Paul's expertise spans across cybersecurity program development, cloud computing, artificial intelligence governance, risk assessment and gap analysis, risk management, PMO management, process development and improvement, and the security development lifecycle (SDLC). He has developed and implemented comprehensive cybersecurity programs in the medical, legal services, and financial services industries, spearheaded complex risk assessments and cybersecurity programs, and supported a cybersecurity services delivery framework for a premier consulting organization.
    He holds a B.S. in Business Administration from Kansas State University, an M.B.A. from Texas Christian University, and is currently earning an M.A. in International Security Studies from the University of Arizona. With over thirty years of industry experience, Paul possesses twenty active credentials in cybersecurity, data privacy, service management, and project management.

  • speaker photo
    John Loya
    VP, Field Engineering, Cyberhaven

    John Loya is the Vice President of Field Engineering at Cyberhaven. He has previously held roles at Microsoft, McAfee, and Digital Guardian. In his current role he assists customers and prospects globally with their data protection needs in terms of compliance, governance, privacy, classification, and security. He has worked previously as a developer, quality assurance engineer, and an automation engineer. He has been in the security space for the past 19 years with a strong focus on Data Loss Prevention and Insider Risk Management.

  • speaker photo
    Kelly Markey, Moderator
    CISO, Affineon Health
  • speaker photo
    Jason Lam
    Senior Manager, Schellman

    Jason Lam is a Senior Manager with Schellman based in Austin, TX. Prior to joining Schellman in 2015, Jason worked as an Enterprise Risk Management Associate at a regional audit firm, specializing in Sarbanes-Oxley (SOX) audits and System and Organization Controls (SOC) examinations. Jason is now primarily focused on ISO certifications for organizations across various industries as well as oversight and development of Schellman's ISO practice. Jason has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security: Certified Public Accountant (CPA), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA).

  • speaker photo
    Danny Manimbo
    Principal | ISO Practice Director | AI Assessment Leader, Schellman

    Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and has over 13 years of experience in providing information security and data privacy audit and compliance services. Danny has achieved the following certifications relevant to the fields of accounting, auditing, and information systems security and privacy: • Certified Public Accountant (CPA) • Certified Information Systems Security Professional (CISSP) • Certified Information Systems Auditor (CISA) • Certified Internal Auditor (CIA) • Certificate of Cloud Security Knowledge (CCSK) • Certified Information Privacy Professional – United States (CIPP/US)

  • speaker photo
    Octavio Herrera
    Chairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)

    Octavio Herrera, a cum laude graduate from Norwich’s University MSIA program, has held a number of information security positions within Fortune 500 companies. During his 25+ years career he has led the regulatory compliance program at Alcoa’s largest business unit, managed the IT Security program for American Family Life Assurance Company of Columbus (AFLAC), served as Information Security Officer for the Houston Independent School district – the seventh largest district in the nation and the largest in Texas - an since 2013, he leads the cyber security practice for Occidental Petroleum Corporation (OXY).

    Mr. Herrera has been honored as one of the “Top 40 Hispanics under 40” by Hispanic Engineer & Information Technology magazine and featured in Fortune Magazine’s March 2009 article, “How to Get a Job”.

    Mr. Herrera is one of the original founding members of the Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC) where he currently serves as a chairman of the board and has been honored as a finalist for the 2024 Houston CISO ORBIE Award, a program that recognizes excellence in technology leadership for Cyber Security leaders nationwide.

  • speaker photo
    Candace McCaddon
    Founder & Managing Attorney, Candace McCaddon Law, PLLC
  • speaker photo
    Roya Gordon
    Deputy CISO, ENGIE North America

    Roya Gordon is the Deputy Chief Information Security Officer (CISO) of ENGIE North America, where she is responsible for the cybersecurity of renewable assets, including solar, wind, battery storage, and power plants. With a 20-year career spanning military intelligence, control systems cybersecurity at Idaho National Laboratory, cyber threat intelligence (CTI) in the energy sector, and Operational Technology (OT) expert in the tech startup space, Roya brings a wealth of expertise to her role. She oversees three dedicated teams focused on IT security, OT security, and IT/OT GRC, ensuring comprehensive protection and compliance. She holds a Master's degree in Global Affairs with a focus on Cyber Warfare from Florida International University (FIU) and served six years in the US Navy as an intelligence specialist.

  • speaker photo
    Gordon Groschl
    CISO & Director, Healthcare Technology Management, Texas Children's Hospital

    Gordon Groschl serves as the Chief Information Security Officer and Director of Healthcare Technology Management at Texas Children's Hospital. He is responsible for protecting the largest and number #1 ranked pediatric health system in the US. With over 25 years of comprehensive experience in telecommunication, healthcare cybersecurity, and technology management, Gordon brings dedication and passion for providing transformational cybersecurity change and organizational change management. He oversees 4 teams covering all aspects of cybersecurity and maintains CISSP, CCSP, HCISPP, and CHCIO certifications. Gordon is focused on transforming cybersecurity programs utilizing innovation in a business-centric approach.

  • speaker photo
    Manoj Tripathi, Moderator
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.