Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 2, 20239:00 am[PLUS Course] Implementing the NIST Cybersecurity FrameworkvCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Wednesday, May 3, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amInfraGard Chapter MeetingOpen to all attendeesRegistration Level:Open Sessions
8:00 am - 8:50 amDiscussion topic and agenda TBD.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] The Dark Side of AI: Unleashing the Power of HackGPT—Your Worst Nightmare Come to LifeHacker, SecKCRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterWelcome to the most cutting-edge, fear-inducing presentation on the dark side of AI. This presentation will take you on a heart-pumping journey into the world of hacking using the power of AI. Our presenter, a self-proclaimed hacker, will share his personal experiences and the latest advancements in ChatGPT technology that will leave you on the edge of your seat. Don’t miss out on this incredible opportunity to explore the dangerous world of AI-powered hacking. But beware: we only want attendees who are not afraid of the dark and who have a deep curiosity for the unknown.
Attendees will leave with a newfound understanding of the immense power and danger of AI in the world of hacking, and the dire need for heightened cybersecurity measures.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amEDR, MDR, XDR: Endpoint Protection ExplainedDirector of Cybersecurity, Children's Mercy Kansas City HospitalRegistration Level:Conference Pass
10:15 am - 11:00 amThis session will focus on what are the differences in all these tools and how to select/use one for your organization effectively.10:15 amIncident ResponseCISO, University of KansasRegistration Level:Conference Pass
10:15 am - 11:00 amSession description coming soon.
10:15 amSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Open Sessions
10:15 am - 11:00 amKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
11:10 am[Panel] There’s a Bad Moon on the Rise – Are You Ready?Registration Level:Open Sessions
11:10 am - 11:55 amLike the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.
The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.
Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.
11:10 amVetting Application RiskDirector, Cybersecurity & IT Infrastructure, Burns & McDonnellRegistration Level:Conference Pass
11:10 am - 11:55 amSession description coming soon.
12:00 pm[Executive Panel] Making the Cybersecurity MusicVP & Global CISO, H&R BlockDirector of IT, Unite Private NetworksRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterOver the last few years, the workforce and the way we work has entirely shifted and evolved. Much like conducting a grand orchestra, cybersecurity executives are now called upon to more than just conduct procedures and make “good music.” Listen to local cybersecurity executives who are in the trenches navigating the “new normal,” the threats impacting the industry, and their different key takeaways and lessons learned along the way. This discussion is followed by a live Q&A, so come prepared to ask your local executives your burning workforce questions!
12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pm[Panel] Lucy in the Cloud with DiamondsSecuring Your Cloud EnvironmentRegistration Level:Open Sessions
1:15 pm - 2:15 pmCan you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.
With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.
Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.
1:15 pmRansomware: How to Stay out off the Front PagesRegistration Level:Conference Pass
1:15 pm - 2:15 pm1:15 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Conference Pass
1:15 pm - 2:15 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pmMulti-Cloud Security Deep DiveCIO / CTO, Summit Carbon SolutionsRegistration Level:Conference Pass
2:30 pm - 3:15 pmSession description coming soon.
2:30 pmDemystifying CybersecurityCISO, Therapy BrandsRegistration Level:Conference Pass
2:30 pm - 3:15 pmSession description coming soon.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pm[Panel] Securing the World: The Next Generation of CybersecurityCISO, Dairy Farmers of AmericaBusiness Information Security Officer (BISO), T-MobileCISO, Check Point Software TechnologiesCISO, Mazuma Credit UnionGlobal BISO & Director of Business Partnership, Cardinal HealthRegistration Level:Open Sessions
3:45 pm - 4:30 pmSession description coming soon.
- Aqua SecurityBooth: TBD
Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.
- CloudflareBooth: TBD
Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.
Secure your websites, APIs, and Internet applications.
Protect corporate networks, employees, and devices.
Write and deploy code that runs on the network edge. - CRESTBooth: n/a
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- EndaceBooth: TBD
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- OktaBooth: TBD
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- ProtivitiBooth: TBD
Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Our consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.
- ReliaQuestBooth: TBD
ReliaQuest, the force multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud native security operations platform, GreyMatter. ReliaQuest’s GreyMatter is built on an open XDR architecture and delivered as a service anywhere in the world, anytime of the day, by bringing together telemetry from tools and applications across cloud, on-premises and hybrid cloud architectures. Hundreds of Fortune 1000 organizations trust ReliaQuest to operationalize security investments, ensuring teams focus on the right problems while closing visibility and capability gaps to proactively manage risk and accelerate initiatives for the business. ReliaQuest is a private company headquartered in Tampa, Fla., with multiple global locations. For more information, visit www.reliaquest.com.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- ZeroFoxBooth: TBD
Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.
Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Corian KennedyHacker, SecKC
Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay one step ahead of cybercriminals. With a current role in advanced research and hacking for one of the most prominent cybersecurity firms in the world, Corian has helped shape the industry's future and continues to push the limits of what is possible in the field of cybersecurity.
- Ravi MongaDirector of Cybersecurity, Children's Mercy Kansas City Hospital
- Ed HudsonCISO, University of Kansas
Hudson brings 20 years of IT security and IT governance experience to the role. He previously worked as the CISO for the California State University system, overseeing strategic information security and privacy efforts for the 23 campuses of the CSU system.
Hudson also served as faculty director for the EDUCAUSE Management Institute, in Louisville, Colorado, where he helped oversee and lead management training sessions with a goal to improve the impact of information technology in higher education. He also worked as a director of security services and maintains a number of professional certifications, including information security manager certification.
Hudson holds a Master of Public Administration with a concentration in leadership from California State University San Bernardino, as well as a Bachelor of Science in Information Technology at the University of Phoenix, Novato, California.
- Okta Representative
- Panel Discussion
- Eric WaltersDirector, Cybersecurity & IT Infrastructure, Burns & McDonnell
A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience includes healthcare cross-disciplinary compliance and privacy, software development, information security program management, cyber security managed services, federal government IT cloud deployments, global transition operations, and 20 years in the military.
- Joshua BrownVP & Global CISO, H&R Block
Joshua Brown is a Chief Information Security Officer, with deep experience in designing and building information security programs to deliver efficient and effective risk management practices. HIs core expertise is in zero trust design, implementation of data-centric risk mitigation, raising security awareness, and aligning security strategy with business requirements.
- Kevin AugspurgerDirector of IT, Unite Private Networks
Kevin Augspurger is an accomplished IT professional with over 18 years’ experience in the industry, 9 of which have been in the telecommunications field. In his career, Kevin specializes in networking, IT security, server/cloud infrastructure, IT management, and facilities/real estate. Additionally, Kevin holds certifications including Certified Information Systems Security Professional (CISSP), Cisco Certified Network Associate (CCNA) Routing + Switching; CCNA Security; and Microsoft Certified Systems Administrator (MCSA).
Prior to the start of his career, Kevin studied Computer Science at the University of Kentucky and earned a BA in Film from University of Kansas. Outside of work, Kevin enjoys building arcade systems, volleyball, watching movies, being a dad.
- Panel Discussion
- Panel Discussion
- Jason CraditCIO / CTO, Summit Carbon Solutions
Jason is a seasoned technology executive in the AEC industry with a focus in Oil & Gas transportation and management. For 20+ years Jason has focused on modernization and cybersecurity as a consultant, service-provider and operator; always questioning conventional knowledge and the status quo in the relentless pursuit of progress. Jason has a MS in Cybersecurity, from the University of Kansas, and an MBA from Rockhurst University. He holds the CISSP and CCSP certifications from ISC2, Security+ from CompTIA and many vendor certifications from Microsoft and AWS, including AWS Security Architect.
- Neil WatkinsCISO, Therapy Brands
- Sherry CallahanCISO, Dairy Farmers of America
Sherry's management career over the last 20 years has spanned multiple IT service areas including information security, infrastructure support, customer support, and disaster recovery\continuity. Perhaps her proudest accomplishments are the programs and teams that she has built from the ground up and the large-scale projects that she has managed successfully in very challenging and highly-regulated environments including the legal industry, healthcare, Fortune 100 finance and electric/nuclear utilities.
As a result of these opportunities, she has earned a reputation as a forward-thinking and capable leader who strives for nothing less than outstanding results and is adept at establishing successful information technology, security and compliance programs in support of organizational objectives while managing cost and risk.
- Dr. Cheryl CooperBusiness Information Security Officer (BISO), T-Mobile
Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.
- Cindi CarterCISO, Check Point Software Technologies
Cindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive with more than 15 years of experience as a transformational leader for both startups and enterprises. Cindi’s expertise includes building Cybersecurity practices in highly regulated industries, turning strategic goals into actionable outcomes, influencing a “secure from the start” culture, developing secure architecture & engineering platforms, and highly collaborative engagement (C-Suite, Board, Clients and Industry) for managing risk.
At Check Point Software Technologies, Cindi is a Chief Information Security Officer in the Office of the CISO, committed to helping other CISOs achieve success in both strategic and tactical initiatives and contributing to Check Point’s own security practices. Cindi possesses a firm grasp of the challenges surrounding the security, privacy, and risk management landscape, and is a trusted advisor within Check Point as well as for our customers. More recently, Cindi was the CISO for IntSights Cyber Threat Intelligence, where she was responsible for driving the company’s internal security initiatives, as well as serving as an external-facing advisor and subject matter expert in the areas of threat intelligence, cybersecurity resilience and risk management. Cindi also served as VP and Chief Security Officer at MedeAnalytics, a healthcare analytics software-as-a-service (SaaS) leader; prior to that Cindi was the Deputy Chief Information Security Officer at Blue Cross and Blue Shield of Kansas City.
Industry Collaboration Cindi is the founding President of Women in Security - Kansas City. She was honored as part of SC Media magazine’s “Women to Watch in Cyber Security” list, and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.” She presents at nationwide conferences, local chapters, and webinars including SecureWorld, RSA Conference, HIMSS, Evanta CxO Summit, and B-Sides. Cindi holds several recognized IT, security, and project management certifications and has a Master of Science degree in Information Technology and a Bachelor of Science degree in Management Information Systems, both from Central Michigan University.
- Britney KennedyGlobal BISO & Director of Business Partnership, Cardinal Health
Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since transitioned to Cardinal Health, initially leading Cyber Operations and now performing as the Director of Information Security Business Partnerships, providing Business Support, Security Awareness, and Compliance Operations across the Globe. Britney is a certified CISSP, CISM, PMP, SSAP. and holds certifications for CompTIA S+, CCSK, and IT Business Management. She holds a BS in Applied & Discrete Mathematics and an MS in Cybersecurity. Britney was also named an IT Security Power Player by SC Magazine and named as the Security Professional of the Year by ASIS Kansas City Chapter in 2020.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your cybersecurity community for learning and professional growth. Sign up today!
