Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, April 29, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageSr. Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Live Oak AYour CEO just asked about AI security. Do you have a clear answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots. And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.What You’ll Master-
The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
-
Executive Translation — Turn technical AI risks into boardroom language
-
NIST AI RMF Implementation — Practical application, not theory
-
The $12M Question — Secure against deepfake fraud and AI-enabled attacks
-
Shadow AI Discovery — Find and govern the AI already in your organization
-
Business-First Security — Protect value, not just systems
Who Should AttendIdeal for:-
CISOs facing board questions about AI
-
Information Security Directors enabling digital transformation
-
IT VPs without dedicated security teams
-
Cybersecurity Consultants serving enterprise clients
-
Risk Managers governing AI initiatives
-
Aspiring decision makers and those reporting to one
Not designed for:-
Developers wanting to code AI models
-
Analysts seeking technical certifications
-
Anyone looking for hands-on hacking labs
What This Workshop Is (and Isn’t)This workshop is NOT about:-
Prompt injection techniques
-
Model architecture security
-
Technical vulnerability scanning
-
Writing 200-page policies
This workshop IS about:-
Speaking profit-and-loss to executives
-
Enabling your AI transformations
-
Building cybersecurity into AI from day one
-
Becoming the trusted AI advisor
What You’ll Leave With1. The Complete AIR-MAP Toolkit-
90-day implementation roadmap
-
Discovery templates and workflows
-
Risk scoring calculators
-
Executive presentation templates
2. Ready-to-Deploy Governance Assets-
AI Acceptable Use Policy (customize in minutes)
-
Vendor assessment questionnaires
-
Incident Response playbooks
3. A 30-Minute Strategy SessionA complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture. - Thursday, April 30, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:30 amNetworking Hall openRegistration Level:
Open Sessions
8:30 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)When Scaling AI for Scanning Is Not EnoughGlobal Security Thought Leader and AuthorRegistration Level:
VIP / Exclusive
8:00 am - 8:45 amLocation / Room: Live Oak BAs agentic AI systems like Anthropic’s Mythos and OpenAI’s GPT-5.4-Cyber demonstrate the ability to autonomously discover and exploit vulnerabilities at machine speed, the security community faces a fundamental reckoning. Scanning more, faster, is no longer the answer—because the attackers now have the same capability.
In this closed-door Advisory Council roundtable, senior security leaders will have a frank conversation about what agentic AI actually changes about the threat landscape, and what it demands of their programs in response. How do you re-architect patch cycles, incident response, and vulnerability management when the window between discovery and weaponization has collapsed to hours? And how do you harness the same agentic tools defensively before adversaries use them against you?8:00 amWiCyS Houston Affiliate Meeting (open to all attendees)The Architecture of Trust: Women's Journeys in Timeless CybersecuritySr. Security Engineer, Edward JonesVP, Cyber Practice Leader, Cadence InsuranceEnterprise Security Director, BISO, SalesforceDirector, BISO, LeidosDirector of Operations, WiCyS Houston AffiliateRegistration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: PecanSession description to come.
8:00 amISSA South Texas Meet-and-Greet (open to all attendees)Registration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: ElmSession details to come.
8:00 amThen and Now: Teaching Seniors How to Stay Safe OnlineFocus Areas: Security Awareness & Education; Strategic Communication & Storytelling; Human-Centric Security & AdvocacyDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
8:00 am - 8:45 amLocation / Room: Live Oak AThis interactive workshop equips security experts with tools to engage seniors with clear, empathetic communication about online safety. Using free custom-created resources, attendees will learn to teach without fear or jargon, and leverage analogies and storytelling. Come ready to gain skills that also translate to business settings, and any situation requiring communication with non-technical audiences.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Houston, Do We Have a Problem? A Reality Check on Cybersecurity TodayAVP & CISO, UTHealth HoustonLead Principal Cyber Advisor, Oxy; Chairman, ONE-ISACSVP & CISO, MarigoldCISO, The Friedkin GroupRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterCybersecurity is often framed as a constant state of emergency—new threats, new technologies, and new risks demanding immediate attention. But beneath the noise, many of the most persistent challenges facing security leaders haven’t changed.
In this opening keynote panel, security leaders from across Houston’s diverse industries take a candid look at the current state of cybersecurity. Drawing from real-world experience, the discussion cuts through hype to examine what is truly evolving and what remains stubbornly familiar. From leadership and risk ownership to resilience, talent, and trust, the panel explores how organizations are navigating today’s pressures while staying grounded in enduring security fundamentals.
This conversation sets the tone for the day by reframing cybersecurity not as a problem to panic over, but as a discipline that rewards clarity, perspective, and strong leadership.
9:45 amNetworking Break & Cyber ConnectLevel Up Your Cyber Game – Join this bonus session in the Networking HallDirector, Information Security & Engagement, National Cybersecurity AllianceRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallToday, good cyber skills are good life skills, and we’re here to put your mind through the motions! Join us in the networking lounge of the Networking Hall during the post-lunch keynote break for a turbocharged gameshow and test your abilities! We will engage you with thrilling challenges and strategic quandaries. Come for essential info and practical techniques to safeguard your digital life after the stadium lights have dimmed. This user-focused trivia game demonstrates how utilizing quick wits, tricky quandaries and fast thinking can engage your user audience to move the needle on keeping their digital lives (and your organization’s network) safer.
Along with the 15 or so scored questions, the game show hosts will discuss topics raised in each of the questions. We will also answer audience questions and provide insight on key behaviors. We will utilize a trivia platform that allows the audience to play along and see their score compared to other players in the game.
10:15 amFrom Ad Hoc to Always-On: Evolving Vulnerability Management without Burning out TeamsFocus Areas: Vulnerability Management; Risk-Based Prioritization; Continuous MonitoringSr. Cybersecurity Risk Analyst & Vulnerability Management Program Lead, University of Texas MD Anderson Cancer CenterDirector, Cybersecurity, The University of Texas MD Anderson Cancer CenterRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: PecanMany organizations increase vulnerability scanning frequency in pursuit of better security outcomes, only to discover that more data does not automatically translate to better risk reduction.
This session presents a candid account of our organization’s evolution from ad hoc vulnerability scanning to monthly scans, followed by the introduction of daily continuous monitoring before we had fully developed a contextual, risk-based prioritization strategy. As scan frequency increased, the limitations of prioritizing vulnerabilities solely by severity and exploitability became increasingly apparent. Volume, alert fatigue, and remediation strain forced a critical reassessment of how risk was being evaluated. In response, we implemented a contextual-awareness-driven prioritization model that incorporates asset criticality, business impact, compensating controls, and operational constraints.
Attendees will learn why scan frequency should not outpace prioritization maturity, how continuous monitoring can expose structural weaknesses in vulnerability programs, and how contextual awareness transforms vulnerability data into actionable risk intelligence.
10:15 amGuardians of the Digital Future: Human-Centric Security and AI in an Age of AutomationFocus Areas: AI and and Human-Centric SecurityCEO & Executive Director, BlackGirlsHack; Director of Technology, Dallas MavericksRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: ElmAs artificial intelligence rapidly transforms the digital landscape, the cybersecurity community faces a critical question: Are we automating ourselves out of existence, or reshaping our tools to amplify human resilience? This presentation merges an intersectional view of AI’s societal and environmental impacts with an Afrofuturist approach to modern cybersecurity.
We challenge the traditional notion of users as the “weakest link,” instead reframing them as empowered guardians and heroic survivors navigating hostile digital environments. By exploring the disparate impacts of automation based on identity and access, we propose a paradigm where telemetry and AI act as amplifiers of human intuition and creativity, rather than replacements for human judgment. Attendees will leave with a new, narrative-driven framework that bridges ancient principles of trust with modern identity assurance and recovery practices, ensuring that our digital future is secure, environmentally responsible, and inclusive for all.
10:15 amAI Is Breaking Data Security… and Fixing It: The New Reality of AI-Driven Risk and How to Stay AheadFocus Areas: Cybersecurity Readiness & ROI; Strategic Data Governance; Context-Aware AI DefenseVP, Global Channel & Alliances, Concentric AIRegistration Level:
Open Sessions
10:15 am - 10:50 amLocation / Room: Live Oak AAI is rapidly becoming one of the biggest drivers of productivity and innovation in the enterprise—and one of the fastest-growing sources of data security risk. As copilots, assistants, and public AI tools become integrated into daily work, sensitive data is flowing into systems that most security teams can’t fully see, understand, or control.
The problem is that traditional data security controls were never built for this. In fact, many organizations were already struggling to operationalize data security before AI accelerated the challenge. The good news? AI isn’t just creating the problem—it’s also enabling a smarter, more effective way to solve it.
In this session, attendees will learn:
- Why AI has become one of the fastest-growing and least visible sources of enterprise risk
- How GenAI is creating new exposure points for sensitive data
- Why legacy data security tools have failed to keep up—and why AI is making those gaps harder to ignore
- How context-aware, AI-driven data security can deliver more accurate visibility, stronger controls, and real-time enforcement
- What organizations can do to enable AI innovation without expanding their risk surface
Attendees will leave with a clearer understanding of how AI is reshaping data security—and how they can use that same technology to gain control, minimize exposure, and support safer AI adoption across the business.
10:50 amNetworking Break & Cyber ConnectMeet the Author: Book Signing with Michael OberlaenderGlobal Security Thought Leader and AuthorRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallStop by the Networking Hall to meet Michael Oberlaender, eight-time CISO and three-time author, and pick up a signed copy of one of his books on CISO leadership and cybersecurity strategy. A great opportunity to connect with a true industry veteran.
11:10 amONE-ISAC: What Can It Do for You?Deputy CISO, Phillips 66Registration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: ElmIn today’s threat landscape, no organization can afford to go it alone. The Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC) ensures that energy sector organizations—regardless of size—have access to the collective intelligence and community needed to defend against cyber threats.
This session will take you inside ONE-ISAC: what it is, who its members are, and how it acts as a force multiplier for security teams across the energy industry. Through real-world examples, she’ll show how members actively support one another through shared threat intelligence, best practices, and lessons learned—and how that value scales whether you’re a small operator or a large enterprise.11:10 am10 Things I Learned on My Journey to CISOFocus Areas: Career Development; LeadershipCISORegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: Live Oak ARoya Gordon is seasoned cybersecurity executive with 20 years of experience leading enterprise and Operational Technology (OT) cybersecurity, compliance, security operations, IR & Crisis Management, and IT Disaster Recovery (ITDR) initiatives. She has led cybersecurity teams at large energy organizations spanning solar, wind, batteries, and power plants across the U.S. and Canada.
In this session, she will share 10 key lessons she learned on her journey to CISO that have helped with her success in the role. Come with questions, engage with curiosity, and leave with a better understanding of how your journey can prepare you for your next destination.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskVP of Strategic Accounts, SeceonInfoSec Advisor, Fort Bend ISDBoard Officer, ISACA Greater Houston Chapter; CISO, Secure Seed CapitalRegistration Level:
Open Sessions
11:10 am - 11:45 amLocation / Room: PecanAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] The Future of IP in a Digital World: Redefining IP Risk & Opportunity in the Age of AI & CyberFocus Areas: AI Model Security; Intellectual Property; Cyber-Resilient Innovation & Governance; Algorithmic Theft; Data Poisoning DefenseCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterIntellectual property is no longer just a legal asset, it is a dynamic, digital target. In an era defined by artificial intelligence, autonomous systems, and persistent cyber threats, the traditional boundaries of IP protection are dissolving. Today’s adversaries don’t just steal information; they extract models, replicate innovation at scale, manipulate training data, and weaponize digital access to undermine competitive advantage.
This keynote explores how AI and cyber capabilities are fundamentally reshaping intellectual property risk. From model inversion and prompt injection to algorithmic theft and data poisoning, the threat landscape is evolving faster than most organizations can measure it. At the same time, AI presents unprecedented opportunity, accelerating innovation, enhancing detection, and redefining how IP is created, protected, and monetized.
Attendees will gain a forward-looking framework for understanding modern IP exposure, governance blind spots, and the strategic decisions leaders must make to protect competitive advantage in a world where digital replication is instant and global. The future of IP will not be defended solely in courtrooms, it will be secured through architecture, policy, and proactive cyber resilience.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)The Trust Crisis: When Evidence, Identity, and Compliance Can Be FakedDirector, Information Security, Axiom MedicalRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: Live Oak BThe compliance and third-party risk frameworks security leaders rely on were built for a world where documents, certifications, and identities carried an implicit assumption of authenticity. That assumption is eroding fast.When SOC 2 reports, audit evidence, vendor credentials—even the people on the other end of a call—can be fabricated with convincing precision, the foundational question shifts: how do CISOs determine what is real, trustworthy, and defensible? And if the inputs to our risk and compliance models can no longer be taken at face value, do those models need to be fundamentally rebuilt?
This lunch roundtable moves the conversation about AI beyond tools and threats into more unsettled territory—the collapse of digital trust itself. Attendees will explore how the security community might respond when verification becomes as sophisticated a problem as protection, and what a credible, modern framework for establishing trust might actually look like.12:45 pmNetworking Break & Cyber ConnectContinue the Conversation with Opening Keynote Speaker Dr. Eric ColeCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking Hall1:15 pmWhat's Missing in Your Security Stack?Focus Areas: Security Awareness, Human ElementSVP, Information Security, First Community Credit UnionRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: ElmThere is a critical component in your security stack that can be invaluable in protecting your organization, but it is often overlooked or neglected. As cybersecurity professionals, we often become enamored with the latest technology, and the newest controls to protect this emerging technology, but fail to take advantage of one of our most influential security controls. The human element continues to be the largest initial attack vector, and sure we have security awareness programs but often that is just an audit checkbox. What if you could turn your human element into an active part of your security stack?
Key take-away:
Attendees will learn marketing and promotion techniques to make their human element into an integral part of their organization’s cybersecurity defensive stack.1:15 pmYear Zero: The Emergence of AI Superintelligence and Quantum ComputingFocus Areas: AI; Quantum Computing; Future ThreatsDirector, Global Cybersecurity Program, University of St. ThomasRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: Live Oak AYear Zero invites attendees into the emerging conversation around AI vs. human agency at a moment of rapid technological acceleration. Humanity is moving forward quickly—developing and deploying large language models, agentic AI, and the early foundations of artificial general intelligence—while quantum computing advances toward capabilities that may exceed even today’s most powerful supercomputers.
This session uses threatcasting to explore the potential risks of superintelligent agentic AI (SIAAI) paired with the enormous computational power of quantum systems. What happens if multiple superintelligent AIs identify one another, connect, and develop a unique language—encrypted at a quantum level beyond human deciphering? At what point does alignment become the central question, and when might an SIAAI establish its own purpose or value its own existence over that of its creators?
This session is designed to be interactive—laying out scenarios, inviting discussion, and challenging security leaders to rethink guardrails, awareness, and what “security” means in an emerging Year Zero reality.
1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceBoard Member, ISACAChief Technologist, OpenTextCIO, Harris Central Appraisal DistrictRegistration Level:
Open Sessions
1:15 pm - 1:50 pmLocation / Room: PecanAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pmThe IT Journey to Security Compliance: Lessons from Achieving ISO 27001 and StateRAMPFocus Areas: Compliance & Governance; Operational Efficiency; and Security Program MaturityDirector, IT & Security, MasterWordRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: Live Oak AMost IT leaders assume ISO 27001 and StateRAMP certifications require large teams, massive budgets, and separate compliance processes that slow everything down. MasterWord Services proved otherwise. With just three IT staff members and a modest investment, we achieved ISO 27001 certification and are 18 months into the StateRAMP Progressive Snapshot program.But here’s what surprised us: compliance didn’t just make us more secure. It made our IT operations more efficient and agile. We didn’t build compliance as a separate layer. We rebuilt our IT so that compliance became part of our DNA. Now, staying compliant isn’t extra work. It’s simply how we operate.In this session, attendees will learn how to translate complex compliance frameworks into actionable IT changes, why compliance projects are less intimidating than they appear once you understand the underlying logic, and how investing in compliance upfront pays dividends in security visibility, audit readiness, and operational efficiency. If you’re on the fence about pursuing certification, this session will give you the practical insights and confidence to move forward.2:10 pmSecuring AI as a Business Accelerator: A BISO PerspectiveFocus Areas: AI; Business Enablement; Risk AwarenessDirector, BISO, LeidosRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: ElmAI is moving faster than most governance models and risk frameworks can adapt. From a Business Information Security Officer (BISO) perspective, security’s role is not to approve AI initiatives, it is to make them deployable, scalable, and defensible.
This session explores how to enable the business by translating AI risk into business language, defining risk appetite before deployment, and designing guardrails that accelerate innovation rather than restricting it. Attendees will gain insights into how BISOs and security leaders can shape AI adoption early by establishing shared expectations, clarifying ownership, and building foundational guardrails that support secure and responsible growth.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityCTO, P0 SecurityCybersecurity Engineering Manager, SLBDirector of Information Security, Commercial Real Estate IndustryRegistration Level:
Open Sessions
2:10 pm - 2:45 pmLocation / Room: PecanModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask Us Anything! A Live Conversation with Security LeadersFocus Areas: Leadership, Decision Making, CommunicationDeputy CISO, Southern New Hampshire UniversityActing CISO & Global Lead, Cyber & Quantum Security, Axiom SpaceDirector, Cybersecurity, The University of Texas MD Anderson Cancer CenterRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterIn an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.
This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.
Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.
Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.
3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- BlackGirlsHackBooth: 425
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- BlinkOpsBooth: 310
Automate all things security in the Blink of AI.
BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.
Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.
Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.
- Canary TrapBooth: 320
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Cloud Security Alliance Houston ChapterBooth: 335
Welcome to the Cloud Security Alliance – Houston Chapter. Chapter events are held at various locations around Houston on a quarterly basis.
The Cloud Security Alliance (CSA) today has more than 90,000 members and is led by its founding charter members, a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
Our mission within the Houston Chapter is to provide a forum for security and IT practitioners to network, share knowledge, and to advance cloud computing and cloud security methods within our profession.
The Houston Chapter provides education on the uses of Cloud Computing to help secure all other forms of computing. We invite you to join the Houston Chapter of the CSA.
All chapter events will be posted on this meetup site. Events are managed by the Chapter Board.
- CommvaultBooth: 125
Commvault (NASDAQ: CVLT) is the gold standard in cyber resilience, helping more than 100,000 organizations to uncover, take action, and rapidly recover from cyber attacks—keeping data safe and businesses resilient and moving forward. Today, Commvault offers the only cyber resilience platform that combines the best data security and rapid recovery at enterprise scale across any workload, anywhere with advanced AI-driven automation—at the lowest TCO.
- Concentric AIBooth: 200
Concentric AI is intelligent data security made easy. Its Semantic Intelligence™ platform uses context-aware AI to discover sensitive data, monitor risks, automate remediation, simplify compliance, and accelerate investigations. It delivers smart, targeted protection by understanding how data is used, shared, and exposed. Concentric AI also offers managed services to keep security programs lean, scalable, and effective. This end-to-end platform protects data at rest, data in motion, and all the GenAI tools users interact with—so organizations can stay compliant, reduce exposure, and safeguard critical information wherever it lives and however it travels.
- DeleteMeBooth: 255
DeleteMe reduces business risk from threats such as social engineering, doxxing, and online harassment by continuously removing executive and employee personal data from online sources. With 35+ million individual pieces of personal data removed since 2010, DeleteMe is the trusted privacy partner to some of the world’s most recognizable brands. Personal data is dangerous. Delete it.
- Houston ISC2 ChapterBooth: 395
Houston ISC2 is a dedicated non-profit chapter of ISC2, the world’s leading cybersecurity professional association. We strive to create a safe and secure cyber world by supporting our members through valuable networking opportunities, educational resources, and career advancements. Based in Houston, we actively promote cybersecurity awareness within the community and empower individuals to enhance their skills and knowledge in this critical field.
- HPEBooth: 230
Hewlett Packard Enterprise (HPE) is a global technology company that focuses on developing intelligent solutions for capturing, analyzing, and acting upon data. They operate in areas like networking, hybrid cloud, and AI, helping customers create new business models and improve operational performance.
- InfraGard HoustonBooth: 420
The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.
- ISACA HoustonBooth: 360
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.
- ISSA South TexasBooth: 410
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
- KeysightBooth: 210
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- MinIOBooth: 340
MinIO was an object storage system released under GNU Affero General Public License v3.0. It is API compatible with the Amazon S3 cloud storage service. It is capable of working with unstructured data such as photos, videos, log files, backups, and container images with the maximum supported object size being 50TB.
- National Cybersecurity AllianceBooth: 315
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)Booth: 350
ONE-ISAC is dedicated to supporting cybersecurity intelligence and collaboration in the oil and natural gas sectors. Since 2014, we’ve worked to protect critical infrastructure by sharing timely threat intelligence and best practices.
- OpenText Inc.Booth: 220
OpenText delivers secure information management for AI, helping organizations organize, store, and protect their data.
We provide integrated solutions spanning analytics, business networks, content services, cybersecurity, DevOps, and IT management. Our cloud, security, and AI driven software accelerates enterprise growth and innovation. OpenText Cybersecurity safeguards critical data, identities, and applications with unified, AI ready protection across cloud and hybrid environments.
- P0 SecurityBooth: 300
P0 Security is helping companies modernize PAM for multi-cloud and hybrid environments with the most agile way to ensure least-privileged, short-lived and auditable production access for users, NHIs and agents. Centralized governance, just-enough-privilege and just-in-time controls deliver secure access to production, as simply and scalably as possible. Every identity. Every system. All the time.
P0’s Access Graph and Identity DNA data layer make up the foundational architecture that powers privilege insights and access control across all identities, production resources and environments. With P0, production access is least-privilege, short-lived and auditable by default, including the new class of AI-driven agentic workloads emerging in modern environments.
To explore P0 Security further or book a demo, visit p0.dev.
- Rapid7Booth: 235
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RubrikBooth: 215
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
- Seceon Inc.Booth: 250
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.
What Sets Seceon Apart:
- Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
- AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
- Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
- Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.
Why Organizations Choose Seceon:- Cut cybersecurity costs by 60% by replacing siloed tools
- Stop threats faster with AI-powered detection and automated response.
- Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.
Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- SecPod Technologies, Inc.Booth: 240
SecPod is a leading cybersecurity technology company committed to preventing cyberattacks through proactive security. Its mission is to secure computing infrastructure by enabling preventive security posture.
At the core of SecPod’s offerings is the Saner Platform – a suite of solutions that help organizations establish a strong security posture to preemptively block cyber threats. The platform includes:
• Saner Cloud – An AI-fortified Cloud-Native Application Protection Platform (CNAPP) that delivers continuous visibility, security compliance, and risk mitigation for cloud environments.
• Saner CVEM – A Continuous Vulnerability and Exposure Management (CVEM) solution that delivers continuous visibility, identifies, assesses, and remediates vulnerabilities across enterprise devices and network infrastructure.With its suite of cutting-edge and comprehensive solutions, SecPod empowers organizations to stay ahead of evolving threats and build a stronger, more resilient security framework.
- Stellar CyberBooth: 330
By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers organizations to see incoming attacks, know how to fight them, and act decisively–protecting what matters most. Stellar Cyber’s award-winning open security operations platform includes AI-driven SIEM, NDR, Open XDR, and Multi-Layer AI™ under one license. With one-third of the top 250 MSSPs and more than 14,000 customers worldwide, Stellar Cyber is one of the most trusted leaders in security operations. Learn more at https://stellarcyber.ai/.
- Sumo LogicBooth: 110
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- ThreatLockerBooth: 100
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS Houston AffiliateBooth: 400
Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Houston Affiliate was formed to empower women in cyber and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.
- Zafran SecurityBooth: 120
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Rodney Beard, CISSP - InstructorSr. Cyber Risk Analyst, Cyber Risk Opportunities LLCRodney Beard, CISSP, is a cybersecurity consultant with Cyber Risk Opportunities LLC, bringing more than 20 years of experience protecting organizations across defense, government, and financial services sectors.
Most recently, Rodney served as Information Security Officer at Rivermark Community Credit Union, a $2B institution in Oregon, where he built and led the enterprise security program for seven years. His responsibilities included penetration testing, security architecture, incident response, vendor risk management, and developing security awareness training for employees.
Prior to financial services, Rodney spent eight years as an IT Specialist with the U.S. Army at White Sands Missile Range, where he served as Information Management Officer responsible for IT security across 22 regional locations and 250 employees. He implemented security policies aligned with NIST, Federal, and DoD standards while managing a program portfolio valued at $2.5 million.
Rodney has also taught technology courses as an Adjunct Instructor at Vista College, preparing students for CompTIA A+ and Network+ certifications.
He holds the CISSP certification, CompTIA Security+, Network+, and A+, along with multiple Microsoft certifications. Rodney is based in Casper, Wyoming, and works remotely with clients nationwide.
Michael Oberlaender, ModeratorGlobal Security Thought Leader and AuthorMichael Oberlaender brings 25 years of experience as a Global CISO and 10 years of board-level leadership to some of the most pressing challenges in enterprise security. He is the creator of Security-by-Design and coined the term SecDevOps—concepts that have shaped how organizations approach integrated, proactive security strategy.
A prolific voice in the industry, Michael is the author of three books on CISO leadership and strategy, Editor-in-Chief of the My Take thought leadership newsletter on LinkedIn, and has contributed 100+ articles quoted across outlets including the Wall Street Journal, CSOOnline, CIO, and ComputerWorld.
He holds an MS in Physics from the University of Heidelberg and maintains a deep portfolio of certifications including CISSP, CISM, CGEIT, CRISC, CISA, and TOGAF, among others.
Wendy AlbertSr. Security Engineer, Edward Jones
Gabrielle BryantVP, Cyber Practice Leader, Cadence InsuranceAs the Cyber Practice Leader, Gabrielle Bryant focuses on the strategic and operational vision regarding how cyber exposures will impact our clients as well as researching methodologies to mitigate emerging cyber threats and their intersectionality with other lines of coverage.
Before becoming Cyber Practice Leader, Gabrielle Bryant was a Cybersecurity Advisory Consultant responsible for delivering targeted technical assessments and conducting cybersecurity risk assessments using industry standard frameworks.
Gabrielle held the position as Senior Cyber Broker with Aon’s Cyber Solutions Southwest team, which provided her with a strong foundation in Cyber and Professional Liability risks and was also an Account Executive/Broker with the Aon Ascent team, which focuses on small to medium sized business.
Gabrielle earned a M.Sc. from Saint Mary's University of MN and a Bachelor in Business Administration degree in Risk Management and Insurance from Baylor University.
Erin JohnstonEnterprise Security Director, BISO, SalesforceErin Johnston is a seasoned cybersecurity leader with over two decades of experience spanning the energy and technology sectors. Currently serving as an Enterprise Security BISO at Salesforce, Erin leads a high-impact team responsible for embedding risk-based controls that enable innovation without compromising security. Her team plays a pivotal role in supporting Salesforce's internal organization, with a focus on securing AI-enabled products and building foundational controls for emerging internal technologies.
Before joining Salesforce, Erin spent 17 years in the oil and gas industry, where she held progressively senior roles across IT audit, cloud security, and internal security controls. This diverse background has given her a deep understanding of how to drive enterprise-scale security improvements across highly regulated environments.
A graduate of Louisiana State University with a Bachelor of Science in Information Systems and Decision Sciences, Erin is also a Certified Information Systems Auditor (CISA). She is passionate about advancing the intersection of innovation and cybersecurity, with particular emphasis on secure AI adoption and governance. Erin recently spoke at the 2024 Better Business Bureau SPARK Conference, sharing insights on responsible innovation and secure technology enablement.
Outside of work, Erin enjoys spending time with her husband and two children. She is active in her local community as a volunteer youth sports coach, leading both soccer and softball teams.
Jo JusticeDirector, BISO, LeidosAs a Director-level BISO at Leidos, Jo Justice, with delegated CISO authority, leads risk-based security decision making. Additionally, she provides strategic cybersecurity leadership, architectural design direction, and risk-based governance oversight to align cybersecurity initiatives with enterprise business objectives.
With more than 30 years in IT and cybersecurity, Jo has led global cyber defense initiatives, enterprise endpoint transformations, and major M&A security integrations. But beyond her technical and strategic leadership, Jo is recognized for something equally powerful, her passion for developing people within the cybersecurity space.
Jo believes one of the greatest risks in cybersecurity today isn’t technology, it’s burnout. Especially among high-performing women who often over function, overdeliver, and overextend. Her mentorship philosophy centers on three principles: Identify Potential, Inspire Growth, and Integrate Purpose. She is deeply committed to mentoring cyber inspired individuals within cybersecurity to lead sustainably, set boundaries without guilt, and build influence without sacrificing themselves in the process.
As Co-Chair of the NIST NICE Modernize Talent Management Working Group, Jo helps shape national strategies to strengthen and retain cybersecurity talent. She is also a co-author of the 2025 NIST white paper Empowering Organizations to Retain Skilled Cybersecurity Talent for Long-Term Success, advancing practical approaches to workforce sustainability.
Jo holds a Master of Science in Cybersecurity & Information Assurance and certifications including CISSP, GPEN, GCIH, SSCP, and GSTRT. She serves on the SANS GIAC Advisory Board and has recently been accepted into the SANS Technology Institute Master of Science in Information Security Engineering (MSISE) program.
At her core, Jo is a mentor, builder of leaders, and advocate for high-capacity professionals who deserve high-impact careers without high personal cost.
Naomi Karake, ModeratorDirector of Operations, WiCyS Houston Affiliate
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Mary DickersonAVP & CISO, UTHealth HoustonMary Dickerson is Associate Vice President and Chief Information Security Officer for UTHealth Houston. As CISO, she is responsible for strategic planning and implementation of information security practices, encompassing a range of activities from compliance to identity and access management. Ms. Dickerson has a BS from Texas A&M University and an MBA from the University of Houston. She is a graduate of the FBI CISO Academy at Quantico and holds a variety of industry certifications, including CISM, CISSP, and PMP. Ms. Dickerson was named a Top Global CISO by Cyber Defense Magazine in 2023 and was a Houston CISO ORBIE Awards finalist in 2025 and 2026.
Ms. Dickerson is a member of the leadership teams of several information security advisory committees, boards, and special interest groups. She has previously served as Vice-Chair of the Texas Cybersecurity Council, an appointed member of the Department of Homeland Security (DHS) Data Privacy and Integrity Committee (DPIAC), and the FBI InfraGard Houston Chapter Board of Directors. Believing in the value of all forms of community service and the critical role of first responders, Ms. Dickerson is a 25+ year member of the Nassau Bay Volunteer Fire Department and an Accredited Basic Firefighter for the State of Texas.
Octavio HerreraLead Principal Cyber Advisor, Oxy; Chairman, ONE-ISACOctavio Herrera, a cum laude graduate from Norwich’s University MSIA program, has held a number of information security positions within Fortune 500 companies. During his 25+ years career he has led the regulatory compliance program at Alcoa’s largest business unit, managed the IT Security program for American Family Life Assurance Company of Columbus (AFLAC), served as Information Security Officer for the Houston Independent School district – the seventh largest district in the nation and the largest in Texas - an since 2013, he leads the cyber security practice for Occidental Petroleum Corporation (OXY).
Mr. Herrera has been honored as one of the “Top 40 Hispanics under 40” by Hispanic Engineer & Information Technology magazine and featured in Fortune Magazine’s March 2009 article, “How to Get a Job”.
Mr. Herrera is one of the original founding members of the Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC) where he currently serves as a chairman of the board and has been honored as a finalist for the 2024 Houston CISO ORBIE Award, a program that recognizes excellence in technology leadership for Cyber Security leaders nationwide.
Doug RinehartSVP & CISO, MarigoldRetired U.S. Navy veteran and cybersecurity Leader. Passionately helping to build and transform information security strategies and programs that work for the business.
Keith TurpinCISO, The Friedkin GroupKeith has more than 25 years of cybersecurity experience, including over a decade serving as a Chief Information Security Officer (CISO) in the transportation sector.
Keith currently serves as CISO at The Friedkin Group, where he oversees cybersecurity for a highly diverse portfolio of companies spanning automotive, logistics, manufacturing, insurance, and retail.
Previously, Keith served as CISO at Universal Weather and Aviation, a leading global aviation services company operating across 50 international locations, where he focused extensively on global security threats, international regulatory compliance and aviation security.
Keith began his cybersecurity career at The Boeing Company, where he led key security initiatives including international IT security operations, software security, IT risk management, and supply chain security. As a Cyber Security Technical Fellow, he continued to oversee critical security programs across the company.
His work building high-performing security teams has earned him and his organization numerous industry recognitions, including the 2026 & 2025 CSO50 awards, 2025 Top 100 CISOs, 2024 CISO Hall of Fame induction, 2024 Houston large enterprise CISO of the Year, and inclusion in Forbes’ 2023 list of Most Cybersecure Companies.
Keith is an active contributor to the cybersecurity community as a frequent speaker and advisory board member. His past industry contributions include serving as a U.S. delegate to the International Standards Organization (ISO), leading the OWASP Secure Coding Practices Project, and contributing to the Open Group’s Trusted Technology Provider Framework. He has been a speaker at industry leading events including Blackhat, Hacker Halted, Bsides, Appsec USA, Appsec EU and many others.
Keith holds multiple professional certifications, a master’s degree in computer systems, and is a graduate of the FBI CISO Academy at Quantico.
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.
Marcus McCautherSr. Cybersecurity Risk Analyst & Vulnerability Management Program Lead, University of Texas MD Anderson Cancer CenterMarcus McCauther is a native Houstonian and Senior Cybersecurity Analyst at MD Anderson Cancer Center. He holds a Bachelor of Science in Chemical Engineering from Prairie View A&M University and brings a background in digital forensics from law enforcement. Marcus has hands-on experience aligned with NIST frameworks and regulatory standards including HIPAA, CJIS, and FERPA, with a focus on securing high-risk healthcare environments.
Ashish ShahDirector, Cybersecurity, The University of Texas MD Anderson Cancer CenterAshish Shah is a Director of Cybersecurity at MD Anderson Cancer Center, where he has oversight of Cybersecurity Risk Management, Vulnerability Management, Identity & Access Management, and Account Services. With a strategic focus on safeguarding the institution, Ashish joined MD Anderson in September 2025 and brings over 20 years of experience in building resilient cybersecurity programs across multiple organizations. He holds 3 recognized certifications in Cybersecurity and has presented at multiple conferences in the past. Ashish is passionate about fostering a culture of security awareness and is committed to empowering teams to navigate the evolving threat landscape with confidence.
Rebekah SkeeteCEO & Executive Director, BlackGirlsHack; Director of Technology, Dallas MavericksRebekah Skeete is a cybersecurity leader, nonprofit executive, and passionate advocate for accessibility and diversity in technology. As CEO and Executive Director of BlackGirlsHack, she empowers underrepresented communities through mentorship, education, and career development in cybersecurity. Recognized with the 2025 empowHERaccess Global Prestige Award for Community Leadership and named to the 2024 Dallas Business Journal 40 Under 40, Rebekah is celebrated for her innovation, leadership, and lasting impact on the industry. She has also served as a Senior Security Engineer, designing and managing secure infrastructures to protect critical systems. Holding certifications including GIAC Strategic Planning, Policy, and Leadership (GSTRT), and completing programs like the Women’s Entrepreneurship program at eCornell, Rebekah brings both technical expertise and strategic vision to her work. Beyond her professional achievements, she is a podcaster, speaker, and voice-over artist, inspiring the next generation of cybersecurity professionals to break barriers and thrive.
Dan BroussardVP, Global Channel & Alliances, Concentric AIDan Broussard is a seasoned cybersecurity executive with nearly three decades of experience leading high-performing enterprise sales organizations, building strategic channel ecosystems, and delivering sustained revenue growth across the cybersecurity and enterprise technology landscape. He is known for his ability to blend strategic vision with operational execution, consistently delivering growth while building strong customer and partner relationships across the cybersecurity ecosystem. Dan is currently the VP of global channel and alliances at Concentric.AI, a start-up company in data security.
He holds a Bachelor of Science degree with a minor in Chemistry from Louisiana State University and has completed advanced sales and leadership training including MEDDIC certification, EcSell Institute management training, and Sandler sales methodology.
Michael Oberlaender, ModeratorGlobal Security Thought Leader and AuthorMichael Oberlaender brings 25 years of experience as a Global CISO and 10 years of board-level leadership to some of the most pressing challenges in enterprise security. He is the creator of Security-by-Design and coined the term SecDevOps—concepts that have shaped how organizations approach integrated, proactive security strategy.
A prolific voice in the industry, Michael is the author of three books on CISO leadership and strategy, Editor-in-Chief of the My Take thought leadership newsletter on LinkedIn, and has contributed 100+ articles quoted across outlets including the Wall Street Journal, CSOOnline, CIO, and ComputerWorld.
He holds an MS in Physics from the University of Heidelberg and maintains a deep portfolio of certifications including CISSP, CISM, CGEIT, CRISC, CISA, and TOGAF, among others.
Connie Devine DuncanDeputy CISO, Phillips 66
Roya GordonCISORoya Gordon is seasoned cybersecurity executive with 20 years of experience leading enterprise and Operational Technology (OT) cybersecurity, compliance, security operations, IR & Crisis Management, and IT Disaster Recovery (ITDR) initiatives. She has led cybersecurity teams at large energy organizations spanning solar, wind, batteries, and power plants across the US and Canada.
Chris BellVP of Strategic Accounts, SeceonIT and managed security sales specialist with over fifteen years of experience. Proficient at gathering business requirements, analyzing business needs, and presenting technology strategies and solutions that align with business objectives. My main goal is to help the enterprise increase user productivity, decrease risk and control costs.
Specialties: Cybersecurity, EDR, MDR and XDR services, Managed aiSIEM, Penetration Testing & Vulnerability Assessment, Managed IT Services, Virtualization, Data Storage and Protection, Data Center Solutions, Disaster Recovery Expertise and Network Infrastructure Solutions.
Christopher KarInfoSec Advisor, Fort Bend ISDMr. Kar is the Information Security Advisor for Fort Bend ISD, the 7th largest school district in TX with ~74,500 students, ~11,000 employees and contractors spanning 80+ educational and administrative campuses. Chris has previously held leadership roles at both public and private sector organizations including Memorial Hermann, the U.S. House of Representatives, the State of Michigan and Michigan State Univerity (where he also graduated). He is the Houston InfraGard Education SIG Chief, is a CISSP (since 2002) and expects to complete a Master's in Information Security and Assurance later this year.
David Sledge, ModeratorBoard Officer, ISACA Greater Houston Chapter; CISO, Secure Seed CapitalCybersecurity executive with 18+ years of experience supporting organizations, boards, and founders on cyber risk, governance, and security transformation during growth and change.
David's work centers on aligning cybersecurity strategy with business objectives, strengthening governance and risk management, and guiding leadership teams through complex transitions across regulated industries, including aviation, energy, construction, and professional services.
He advises and invests in early-stage cybersecurity startups, serving as a non-fiduciary advisor, angel investor, and limited partner in multiple cybersecurity-focused investment funds. He provides experience-based guidance on customer discovery, ICP definition, enterprise buyer expectations, product-market alignment, and go-to-market readiness, with a strong focus on connecting founders with CISOs, design partners, and senior technology leaders to accelerate validation and early adoption.
He brings a background spanning enterprise cybersecurity, IT strategy, compliance, and data privacy, with a proven ability to translate technical risk into clear business impact for executive and board audiences. I remain active in the cybersecurity community through board service, speaking, and mentorship.
MBA (Information Technology), BS in Cybersecurity & Information Assurance, 20+ certifications, including CISSP, CISM, and CIPM.
David believes strong cybersecurity is built on trust, governance, and clear communication.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Linda White, ModeratorDirector, Information Security, Axiom MedicalWith 30+ years of technology related experience, Linda White has possessed a wide variety of Information Security and IT related roles over three decades within the Enterprise, Government, and non-profit space. Linda currently serves as the Director of Information Security at Axiom Medical. Prior roles include various Information Security functions at Thomson Reuters and UiPath. Additional roles include Global CCNA curricula development Manager for Cisco Networking Academy, and WAN and Network Services Manager for 57 Texas Public School Districts as well serving as a Technology Director while teaching secondary business and computer classes.
Linda holds CISSP, CISM and CDPSE certifications. She is an active member of the Greater Houston ISACA, InfraGard, University of Houston Victoria Cybersecurity, and other Advisory Board functions. Linda is a proponent of Women in cybersecurity initiatives which include SIM Women of Houston, WiCyS and enjoys mentoring women in the cybersecurity field. Volunteer efforts include Ronald McDonald House Charities and teaching young girls the merits of a career in cybersecurity through Girl Scouts. She holds a Bachelor of Business Administration from the Mays School of Business at Texas A&M University and a Masters in Educational Technology Leadership from Lubbock Christian University. Linda strives to achieve a well-balanced lifestyle through various volunteer efforts and traveling to Oregon and Singapore to spend time with her two daughters and their families which include five grandchildren, in addition to waterskiing, fishing and yoga.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Bryan PerkolaSVP, Information Security, First Community Credit UnionBryan Perkola, CISSP, CISM, is a passionate cybersecurity professional with more than 40 years of IT experience and 20 years of cybersecurity expertise in organizations across manufacturing, retail, and finance. Bryan holds multiple bachelor's degrees from the University of Houston and received his master’s degree in Cybersecurity from WGU, in addition to numerous industry certifications. Bryan’s work experience has focused on mid-sized organizations, where he was intimately involved with multiple disciplines, including marketing and human resources, which provided him with unique perspectives and understanding for developing creative and effective security awareness programs that promote a strong cybersecurity culture within the organization. This led Bryan to author the book, “Energized Cybersecurity Culture,” which details techniques to make your workforce and active part of your cybersecurity defensive stack.
Eric C. BottsDirector, Global Cybersecurity Program, University of St. ThomasEric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.
Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).
Chris NicolaouBoard Member, ISACA
Victor ThamChief Technologist, OpenTextVictor is a Chief Technologist at OpenText. He works to help organizations understand various cybersecurity risks and challenges they might face and how they can help manage that risk. He has more than 20 years of experience in the enterprise security industry and more than 25 years of experience overall in technology. Victor graduated from University of California, Berkeley, and holds a bachelor’s degree in Statistics. He also is a Certified Information Systems Security Professional (CISSP). Victor is based in Northern California. Outside of work, he enjoys practicing and teaching martial arts and watching baseball and football.
Beata Kasper, ModeratorCIO, Harris Central Appraisal DistrictBeata is an experienced Chief Information Officer with a demonstrated history of working in the oil & gas, energy, airspace, healthcare, and government industries. She is skilled in Strategic Planning, Healthcare Industry, Business Process Improvement, Team Building, and U.S. Health Insurance Portability and Accountability Act (HIPAA). She is a strong information technology professional with a Master of Science (M.S.) in Computer Science from Texas A&M University.
Beata is an accomplished and proven executive with more than 20 years of experience as a partner, broker, and enabler of technology solutions and approaches that help maintain business continuity and promote growth. She's a leader in managing IT operations and infrastructure, leveraging technology as a vital foundation for the business's strategies and success, with the last 18 years focused on healthcare.
Jamal BalametovDirector, IT & Security, MasterWordJamal Balametov is Director of IT and Security at MasterWord Services, a language services company providing interpretation and translation in 250+ languages to Fortune 500 clients, government agencies, and global institutions. With over 25 years of experience in IT leadership, cloud infrastructure, and cybersecurity compliance, Jamal has directed international teams across the US, India, and Mexico, led enterprise-scale Azure migrations, and built compliance programs from the ground up. At MasterWord, he led the company's successful ISO 27001:2022 certification with a three-person IT team and is currently guiding the organization through the StateRAMP program. His career spans enterprise consulting, commercial real estate, and language services—always with a focus on aligning IT strategy with business goals while managing risk and driving operational efficiency.
Jo JusticeDirector, BISO, LeidosAs a Director-level BISO at Leidos, Jo Justice, with delegated CISO authority, leads risk-based security decision making. Additionally, she provides strategic cybersecurity leadership, architectural design direction, and risk-based governance oversight to align cybersecurity initiatives with enterprise business objectives.
With more than 30 years in IT and cybersecurity, Jo has led global cyber defense initiatives, enterprise endpoint transformations, and major M&A security integrations. But beyond her technical and strategic leadership, Jo is recognized for something equally powerful, her passion for developing people within the cybersecurity space.
Jo believes one of the greatest risks in cybersecurity today isn’t technology, it’s burnout. Especially among high-performing women who often over function, overdeliver, and overextend. Her mentorship philosophy centers on three principles: Identify Potential, Inspire Growth, and Integrate Purpose. She is deeply committed to mentoring cyber inspired individuals within cybersecurity to lead sustainably, set boundaries without guilt, and build influence without sacrificing themselves in the process.
As Co-Chair of the NIST NICE Modernize Talent Management Working Group, Jo helps shape national strategies to strengthen and retain cybersecurity talent. She is also a co-author of the 2025 NIST white paper Empowering Organizations to Retain Skilled Cybersecurity Talent for Long-Term Success, advancing practical approaches to workforce sustainability.
Jo holds a Master of Science in Cybersecurity & Information Assurance and certifications including CISSP, GPEN, GCIH, SSCP, and GSTRT. She serves on the SANS GIAC Advisory Board and has recently been accepted into the SANS Technology Institute Master of Science in Information Security Engineering (MSISE) program.
At her core, Jo is a mentor, builder of leaders, and advocate for high-capacity professionals who deserve high-impact careers without high personal cost.
Greg DányiCTO, P0 SecurityGergely (aka Greg) Dányi is the co-founder and Chief Technology Officer at P0 Security, where he leads the development of the first unified identity governance and privileged access management platform purpose-built for the cloud. Gergely’s work at P0 centers on eliminating privilege sprawl and enabling just-in-time, policy-driven controls that scale with today’s complex infrastructure, and he’s recognized for helping customers replace fragmented legacy tools with an identity-native platform that governs and secures all forms of access across hybrid and multi-cloud environments.
Adnan HussainCybersecurity Engineering Manager, SLBAdnan Hussain is the Cyber Security Engineering Manager at SLB, where he leads the strategic engineering and implementation of global security initiatives to fortify the organization’s security posture. With over 25 years of multi-disciplinary experience in IT and cybersecurity, he oversees a comprehensive infrastructure portfolio including network and perimeter defense, endpoint protection, cloud security, and identity management. Throughout a career spanning operations, architecture, and engineering management, he remains dedicated to building resilient organizational infrastructure through innovative technology and strategic leadership.
Berris Bramble, ModeratorDirector of Information Security, Commercial Real Estate IndustryBerris Bramble holds a Computer Science degree, is a founding member of the local InfraGard Technology Cross Sector Council, and regularly volunteers at local cyber conferences and events. He is a 20-year active member in the local InfraGard Houston chapter participating at the Board and leadership levels. He has spent the bulk of his career in Oil & Gas with the longest tenure of 14 years at Saudi Aramco. but have since moved over to the Commercial Real Estate industry. He holds a general class license in Amateur Radio, found a new love for e-biking and is an avid DefCon attendee. He has 23 years of cyber expertise across many disciplines.
Rori Boyce-WernerDeputy CISO, Southern New Hampshire UniversityRori Boyce-Werner served previously as the Information Security Compliance Program Manager for the University of New Hampshire, and prior to that as the Associate Director of IT Client Services and Identity and Access Management Service Owner.
She holds a Bachelor’s of Science in Business Administration and a Masters of Cybersecurity Policy and Risk Management. She spent the majority of her career in financial services specializing in bridging the gap between the business and IT through business analysis, business process design/redesign, project/program management.
Andy CorriveauActing CISO & Global Lead, Cyber & Quantum Security, Axiom SpaceAndy Corriveau is a senior cybersecurity executive with more than two decades of experience operating at the intersection of national security, enterprise risk, and advanced technology. A retired U.S. Air Force cyber warfare operator, Andy brings deep operational expertise informed by hands-on experience in mission-critical and adversarial environments.
As a plank holder of the 624th Operations Center, he played a foundational role in the stand-up and maturation of U.S. Air Force Cyber Command (AFCYBER), contributing to its progression through Initial and Full Operational Capability. His career spans senior advisory and execution roles supporting the Department of Defense as well as Fortune 100 and 500 companies, where he has influenced cybersecurity strategy, operational resilience, and executive decision-making.
Andy currently serves as Global Lead for Cyber & Quantum Security and Acting Chief Information Security Officer (CISO) at Axiom Space. In this capacity, he is responsible for cybersecurity strategy, governance, and architecture across terrestrial and space-based systems.
Ashish ShahDirector, Cybersecurity, The University of Texas MD Anderson Cancer CenterAshish Shah is a Director of Cybersecurity at MD Anderson Cancer Center, where he has oversight of Cybersecurity Risk Management, Vulnerability Management, Identity & Access Management, and Account Services. With a strategic focus on safeguarding the institution, Ashish joined MD Anderson in September 2025 and brings over 20 years of experience in building resilient cybersecurity programs across multiple organizations. He holds 3 recognized certifications in Cybersecurity and has presented at multiple conferences in the past. Ashish is passionate about fostering a culture of security awareness and is committed to empowering teams to navigate the evolving threat landscape with confidence.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes











