Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 2, 2023
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, May 3, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    InfraGard Chapter Meeting
    • session level icon
    Open to all attendees
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am

    Discussion topic and agenda TBD.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am

    This roundtable discussion is for our Advisory Council members only.

    9:00 am
    [Opening Keynote] The Dark Side of AI: Unleashing the Power of HackGPT—Your Worst Nightmare Come to Life
    • session level icon
    speaker photo
    Hacker, SecKC
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Welcome to the most cutting-edge, fear-inducing presentation on the dark side of AI. This presentation will take you on a heart-pumping journey into the world of hacking using the power of AI. Our presenter, a self-proclaimed hacker, will share his personal experiences and the latest advancements in ChatGPT technology that will leave you on the edge of your seat. Don’t miss out on this incredible opportunity to explore the dangerous world of AI-powered hacking. But beware: we only want attendees who are not afraid of the dark and who have a deep curiosity for the unknown.

    Attendees will leave with a newfound understanding of the immense power and danger of AI in the world of hacking, and the dire need for heightened cybersecurity measures.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:15 am
    EDR, MDR, XDR: Endpoint Protection Explained
    • session level icon
    speaker photo
    Director of Cybersecurity, Children's Mercy Kansas City Hospital
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    This session will focus on what are the differences in all these tools and how to select/use one for your organization effectively.
    10:15 am
    Incident Response
    • session level icon
    speaker photo
    CISO, University of Kansas
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Session description coming soon.

    10:15 am
    Securing Your Sensitive Assets in a Cloud-First World
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Key take-away: 
    How to rethink database security controls in a cloud-first world.

    For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:

    • Amount of data created, collected, and stored
    • Number of repositories storing sensitive data across clouds
    • Number of users and applications that need access to data
    11:10 am
    [Panel] There’s a Bad Moon on the Rise – Are You Ready?
    • session level icon
    Identifying the Current Threat Landscape
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Like the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.

    The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.

    Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.

    11:10 am
    Vetting Application Risk
    • session level icon
    speaker photo
    Director, Cybersecurity & IT Infrastructure, Burns & McDonnell
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Session description coming soon.

    12:00 pm
    [Executive Panel] Making the Cybersecurity Music
    • session level icon
    speaker photo
    VP & Global CISO, H&R Block
    speaker photo
    Director of IT, Unite Private Networks
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Over the last few years, the workforce and the way we work has entirely shifted and evolved. Much like conducting a grand orchestra, cybersecurity executives are now called upon to more than just conduct procedures and make “good music.” Listen to local cybersecurity executives who are in the trenches navigating the “new normal,” the threats impacting the industry, and their different key takeaways and lessons learned along the way. This discussion is followed by a live Q&A, so come prepared to ask your local executives your burning workforce questions!

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Advisory Council – VIP / INVITE ONLY

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    [Panel] Lucy in the Cloud with Diamonds
    • session level icon
    Securing Your Cloud Environment
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Can you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.

    With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.

    Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.

    1:15 pm
    Ransomware: How to Stay out off the Front Pages
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    1:15 pm
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:30 pm
    Multi-Cloud Security Deep Dive
    • session level icon
    speaker photo
    CIO / CTO, Summit Carbon Solutions
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Session description coming soon.

    2:30 pm
    Demystifying Cybersecurity
    • session level icon
    speaker photo
    CISO, Therapy Brands
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Session description coming soon.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [Panel] Securing the World: The Next Generation of Cybersecurity
    • session level icon
    speaker photo
    CISO, Dairy Farmers of America
    speaker photo
    Business Information Security Officer (BISO), T-Mobile
    speaker photo
    CISO, Check Point Software Technologies
    speaker photo
    CISO, Mazuma Credit Union
    speaker photo
    Global BISO & Director of Business Partnership, Cardinal Health
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm

    Session description coming soon.

Exhibitors
  • Aqua Security
    Booth: TBD

    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

  • Cloudflare
    Booth: TBD

    Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

    Secure your websites, APIs, and Internet applications.
    Protect corporate networks, employees, and devices.
    Write and deploy code that runs on the network edge.

  • CREST
    Booth: n/a

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Endace
    Booth: TBD

    Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.

  • Okta
    Booth: TBD

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Protiviti
    Booth: TBD

    Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Our consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

  • ReliaQuest
    Booth: TBD

    ReliaQuest, the force multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud native security operations platform, GreyMatter. ReliaQuest’s GreyMatter is built on an open XDR architecture and delivered as a service anywhere in the world, anytime of the day, by bringing together telemetry from tools and applications across cloud, on-premises and hybrid cloud architectures. Hundreds of Fortune 1000 organizations trust ReliaQuest to operationalize security investments, ensuring teams focus on the right problems while closing visibility and capability gaps to proactively manage risk and accelerate initiatives for the business. ReliaQuest is a private company headquartered in Tampa, Fla., with multiple global locations. For more information, visit www.reliaquest.com.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • ZeroFox
    Booth: TBD

    Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.

    Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Corian Kennedy
    Hacker, SecKC

    Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay one step ahead of cybercriminals. With a current role in advanced research and hacking for one of the most prominent cybersecurity firms in the world, Corian has helped shape the industry's future and continues to push the limits of what is possible in the field of cybersecurity.

  • speaker photo
    Ravi Monga
    Director of Cybersecurity, Children's Mercy Kansas City Hospital
  • speaker photo
    Ed Hudson
    CISO, University of Kansas

    Hudson brings 20 years of IT security and IT governance experience to the role. He previously worked as the CISO for the California State University system, overseeing strategic information security and privacy efforts for the 23 campuses of the CSU system.

    Hudson also served as faculty director for the EDUCAUSE Management Institute, in Louisville, Colorado, where he helped oversee and lead management training sessions with a goal to improve the impact of information technology in higher education. He also worked as a director of security services and maintains a number of professional certifications, including information security manager certification.

    Hudson holds a Master of Public Administration with a concentration in leadership from California State University San Bernardino, as well as a Bachelor of Science in Information Technology at the University of Phoenix, Novato, California.

  • speaker photo
    Okta Representative
  • speaker photo
    Panel Discussion
  • speaker photo
    Eric Walters
    Director, Cybersecurity & IT Infrastructure, Burns & McDonnell

    A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience includes healthcare cross-disciplinary compliance and privacy, software development, information security program management, cyber security managed services, federal government IT cloud deployments, global transition operations, and 20 years in the military.

  • speaker photo
    Joshua Brown
    VP & Global CISO, H&R Block

    Joshua Brown is a Chief Information Security Officer, with deep experience in designing and building information security programs to deliver efficient and effective risk management practices. HIs core expertise is in zero trust design, implementation of data-centric risk mitigation, raising security awareness, and aligning security strategy with business requirements.

  • speaker photo
    Kevin Augspurger
    Director of IT, Unite Private Networks

    Kevin Augspurger is an accomplished IT professional with over 18 years’ experience in the industry, 9 of which have been in the telecommunications field. In his career, Kevin specializes in networking, IT security, server/cloud infrastructure, IT management, and facilities/real estate. Additionally, Kevin holds certifications including Certified Information Systems Security Professional (CISSP), Cisco Certified Network Associate (CCNA) Routing + Switching; CCNA Security; and Microsoft Certified Systems Administrator (MCSA).

    Prior to the start of his career, Kevin studied Computer Science at the University of Kentucky and earned a BA in Film from University of Kansas. Outside of work, Kevin enjoys building arcade systems, volleyball, watching movies, being a dad.

  • speaker photo
    Panel Discussion
  • speaker photo
    Panel Discussion
  • speaker photo
    Jason Cradit
    CIO / CTO, Summit Carbon Solutions

    Jason is a seasoned technology executive in the AEC industry with a focus in Oil & Gas transportation and management. For 20+ years Jason has focused on modernization and cybersecurity as a consultant, service-provider and operator; always questioning conventional knowledge and the status quo in the relentless pursuit of progress. Jason has a MS in Cybersecurity, from the University of Kansas, and an MBA from Rockhurst University. He holds the CISSP and CCSP certifications from ISC2, Security+ from CompTIA and many vendor certifications from Microsoft and AWS, including AWS Security Architect.

  • speaker photo
    Neil Watkins
    CISO, Therapy Brands
  • speaker photo
    Sherry Callahan
    CISO, Dairy Farmers of America

    Sherry's management career over the last 20 years has spanned multiple IT service areas including information security, infrastructure support, customer support, and disaster recovery\continuity. Perhaps her proudest accomplishments are the programs and teams that she has built from the ground up and the large-scale projects that she has managed successfully in very challenging and highly-regulated environments including the legal industry, healthcare, Fortune 100 finance and electric/nuclear utilities.

    As a result of these opportunities, she has earned a reputation as a forward-thinking and capable leader who strives for nothing less than outstanding results and is adept at establishing successful information technology, security and compliance programs in support of organizational objectives while managing cost and risk.

  • speaker photo
    Dr. Cheryl Cooper
    Business Information Security Officer (BISO), T-Mobile

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.

  • speaker photo
    Cindi Carter
    CISO, Check Point Software Technologies

    Cindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive with more than 15 years of experience as a transformational leader for both startups and enterprises. Cindi’s expertise includes building Cybersecurity practices in highly regulated industries, turning strategic goals into actionable outcomes, influencing a “secure from the start” culture, developing secure architecture & engineering platforms, and highly collaborative engagement (C-Suite, Board, Clients and Industry) for managing risk.

    At Check Point Software Technologies, Cindi is a Chief Information Security Officer in the Office of the CISO, committed to helping other CISOs achieve success in both strategic and tactical initiatives and contributing to Check Point’s own security practices. Cindi possesses a firm grasp of the challenges surrounding the security, privacy, and risk management landscape, and is a trusted advisor within Check Point as well as for our customers. More recently, Cindi was the CISO for IntSights Cyber Threat Intelligence, where she was responsible for driving the company’s internal security initiatives, as well as serving as an external-facing advisor and subject matter expert in the areas of threat intelligence, cybersecurity resilience and risk management. Cindi also served as VP and Chief Security Officer at MedeAnalytics, a healthcare analytics software-as-a-service (SaaS) leader; prior to that Cindi was the Deputy Chief Information Security Officer at Blue Cross and Blue Shield of Kansas City.

    Industry Collaboration Cindi is the founding President of Women in Security - Kansas City. She was honored as part of SC Media magazine’s “Women to Watch in Cyber Security” list, and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.” She presents at nationwide conferences, local chapters, and webinars including SecureWorld, RSA Conference, HIMSS, Evanta CxO Summit, and B-Sides. Cindi holds several recognized IT, security, and project management certifications and has a Master of Science degree in Information Technology and a Bachelor of Science degree in Management Information Systems, both from Central Michigan University.

  • speaker photo
    Monica Cole-Rowe
    CISO, Mazuma Credit Union
  • speaker photo
    Britney Kennedy
    Global BISO & Director of Business Partnership, Cardinal Health

    Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since transitioned to Cardinal Health, initially leading Cyber Operations and now performing as the Director of Information Security Business Partnerships, providing Business Support, Security Awareness, and Compliance Operations across the Globe. Britney is a certified CISSP, CISM, PMP, SSAP. and holds certifications for CompTIA S+, CCSK, and IT Business Management. She holds a BS in Applied & Discrete Mathematics and an MS in Cybersecurity. Britney was also named an IT Security Power Player by SC Magazine and named as the Security Professional of the Year by ASIS Kansas City Chapter in 2020.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Grow in person!

Join your cybersecurity community for learning and professional growth. Sign up today!