googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 2, 2023
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: CY-6

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, May 3, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Trends in Ransomware Attacks - ISSA Chapter Meeting
    • session level icon
    Open to all attendees
    speaker photo
    President, ISSA KC Chapter
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: CY-5

    In this presentation, you will learn:

    • Ransomware trends
    • Ransomware attack types
    • Security Hygiene
    8:00 am
    InfraGard Chapter Meeting: Partnership for Protection Community Updates
    • session level icon
    Open to all attendees
    speaker photo
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District
    speaker photo
    Information Security Manager, Jackson County, MO
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: CY-6

    Session description coming soon.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: CY-7

    This roundtable discussion is for our Advisory Council members only.

    9:00 am
    [Opening Keynote] The Dark Side of AI: Unleashing the Power of HackGPT—Your Worst Nightmare Come to Life
    • session level icon
    speaker photo
    Hacker & Founder, SecKC
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Welcome to the most cutting-edge, fear-inducing presentation on the dark side of AI. This presentation will take you on a heart-pumping journey into the world of hacking using the power of AI. Our presenter, a self-proclaimed hacker, will share his personal experiences and the latest advancements in ChatGPT technology that will leave you on the edge of your seat. Don’t miss out on this incredible opportunity to explore the dangerous world of AI-powered hacking. But beware: we only want attendees who are not afraid of the dark and who have a deep curiosity for the unknown.

    Attendees will leave with a newfound understanding of the immense power and danger of AI in the world of hacking, and the dire need for heightened cybersecurity measures.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Social Engineering: Training the Human Firewall
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: CY-6

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    10:15 am
    Your Career in Cybersecurity
    • session level icon
    speaker photo
    Author, "Break In Cyber," vCISO
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: CY-5

    Whether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you “level up” in your career. This sessions will cover:

    • Best ways to achieve career growth
    • Education (certifications or on-the-job experience?)
    • Short-term career planning
    • Long-term career planning
    • Different paths in cybersecurity (Red Team, Blue Team, GRC, and more)

    Even if you are satisfied in your current role, learn how to make yourself “recession proof.”

    10:15 am
    Don't Fight Reality: Lessons Learned in Deploying Modern Endpoint Management
    • session level icon
    speaker photo
    Director of Information Security & Privacy Officer, Children International
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: CY-4
    Rob Arnold will share some key findings from a lessons learned review of Children International’s Intune deployment, with a bonus track describing how they improved security by automagically rotating local admin passwords.
    11:10 am
    Vetting Application Risk
    • session level icon
    speaker photo
    Director, Cybersecurity & IT Infrastructure, Burns & McDonnell
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: CY-5

    Is your company vetting applications? What is your process? Are employees putting your company at risk without your knowledge? How is this risk measured? Is the legal team reviewing the EULA? Are the permissions the cloud application is requesting overly permissive? What occurs if the application is breached? Is your data at risk? Who is liable? These and many more questions will be discussed in this presentation.

    11:10 am
    [Panel] There's a Bad Moon on the Rise – Are You Ready?
    • session level icon
    Identifying the Current Threat Landscape
    speaker photo
    Sr. Solutions Engineer, Okta
    speaker photo
    CISO, Dolby Laboratories
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    speaker photo
    Principal Security Program Manager, Microsoft
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: CY-3

    Like the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.

    The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.

    Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.

    12:00 pm
    [Panel] Making the Cybersecurity Music
    • session level icon
    speaker photo
    VP & Global CISO, H&R Block
    speaker photo
    Director of IT, Unite Private Networks
    speaker photo
    Deputy CISO, FNBO Bank
    speaker photo
    Global Diversity & Inclusion Advisor, Board Member, XR Safety Initative (XRSI)
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Over the last few years, the workforce and the way we work has entirely shifted and evolved. Much like conducting a grand orchestra, cybersecurity executives are now called upon to more than just conduct procedures and make “good music.” Listen to local cybersecurity executives who are in the trenches navigating the “new normal,” the threats impacting the industry, and their different key takeaways and lessons learned along the way. This discussion is followed by a live Q&A, so come prepared to ask your local executives your burning workforce questions!

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    speaker photo
    Manager, Information Security, Helzberg Diamonds
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: CY-7

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Generating Your Own Threat Intelligence: One Key to Success
    • session level icon
    speaker photo
    VP of Information Security, Shamrock Trading Corporation
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: CY-5

    Session description coming soon.

    1:15 pm
    [Panel] Lucy in the Cloud with Diamonds
    • session level icon
    Securing Your Cloud Environment
    speaker photo
    Partner Solutions Architect, Cloudflare
    speaker photo
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud
    speaker photo
    Director of Solution Architects, Aqua Security
    speaker photo
    SVP & CISO, Security Bank of Kansas City
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: CY-3

    Can you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.

    With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.

    Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:30 pm
    Securing the Clouds: Best Practices for Multi-Cloud Cybersecurity
    • session level icon
    speaker photo
    CIO / CTO, Summit Carbon Solutions
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: CY-5

    This presentation will focus on the importance of multi-cloud cybersecurity and the key strategies that organizations can employ to secure their multi-cloud environments. The multi-cloud approach has become increasingly popular due to its ability to provide flexibility and scalability, but it also presents unique challenges for cybersecurity. With multiple cloud providers, data and applications are distributed across various platforms, making it difficult to maintain consistent security measures. This presentation will outline the best practices for ensuring robust security across multiple clouds. Topics covered will include network segmentation, access control, threat detection and response, and compliance management. The presentation will also provide real-world examples of successful multi-cloud security implementations and highlight the importance of ongoing monitoring and risk management. Attendees will gain a deep understanding of the multi-cloud security landscape and leave with actionable insights for improving their organization’s security posture.

    2:30 pm
    Succeeding in Succession Planning: The Future You Build
    • session level icon
    speaker photo
    CISO, Veterans United Home Loans
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: CY-4

    Cybersecurity leaders are experiencing serious challenges on non-technical fronts with 8,000-10,000 Baby Boomers retiring every day, the loss of more than 100,000 technical jobs in the last six months, five generations in the workforce, and pressing needs to be more risk-focused. Many people are addressing the technical challenges, but few are truly addressing and developing solutions for the coming issues of non-technical leadership issues. Join Randy as he serves as a guide to help you learn how to Identify and Develop Cybersecurity Leaders and how to create a leadership pipeline in your organization.

    2:30 pm
    Incident Response and Federal Law Enforcement Engagement
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: CY-6
    This presentation will discuss the need for companies to have a well-defined incident response plan that can respond to swiftly moving cybersecurity incidents. It will also cover the benefits to law enforcement engagement, how to do so, and discuss real-world examples of cybersecurity incidents that have been successfully mitigated through a strong plan and partnership with the FBI.
    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 5:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:45 pm
    [Panel] Securing the World: The Next Generation of Cybersecurity
    • session level icon
    speaker photo
    CISO, Dairy Farmers of America
    speaker photo
    Business Information Security Officer (BISO), T-Mobile
    speaker photo
    CISO & C-Suite Advisor, Check Point Software Technologies
    speaker photo
    CISO, Mazuma Credit Union
    speaker photo
    Global BISO & Director of Business Partnership, Cardinal Health
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater

    Session description coming soon.

Exhibitors
  • Aqua Security
    Booth: 360

    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

  • Arctic Wolf + Tanium
    Booth: 320

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

    Tanium was founded to deliver a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness that does not slow down as the enterprise environment scales. Tanium is empowering the largest enterprises in the world to gather critical information globally from every endpoint and drive remediating action in seconds, including the distribution of patches, applications, and tools – all from a single server. For more information about Tanium, visit: https://www.tanium.com.

  • Cloudflare
    Booth: 210

    Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

    Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations—from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.

    Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest internet trends and insights at radar.cloudflare.com.

  • CREST
    Booth: TBD

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Endace
    Booth: 160

    Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.

  • Mandiant, now part of Google Cloud
    Booth: 380

    Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

  • InfraGard Kansas City
    Booth: 220

    InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.

    The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.

  • ISACA Kansas City
    Booth: 170

    Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.

  • ISSA Kansas City
    Booth: 140

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

  • Okta
    Booth: 240

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Protiviti
    Booth: 180

    Protiviti is a global consulting firm that delivers deep expertise, objective insights, a tailored approach and unparalleled collaboration to help leaders confidently face the future. Our consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

  • Recorded Future
    Booth: 130

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • ReliaQuest
    Booth: 230

    ReliaQuest, the force multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud native security operations platform, GreyMatter. ReliaQuest’s GreyMatter is built on an open XDR architecture and delivered as a service anywhere in the world, anytime of the day, by bringing together telemetry from tools and applications across cloud, on-premises and hybrid cloud architectures. Hundreds of Fortune 1000 organizations trust ReliaQuest to operationalize security investments, ensuring teams focus on the right problems while closing visibility and capability gaps to proactively manage risk and accelerate initiatives for the business. ReliaQuest is a private company headquartered in Tampa, Fla., with multiple global locations. For more information, visit www.reliaquest.com.

  • Rubrik
    Booth: 250

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: 330

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Veeam Software
    Booth: 310

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • Women in Security – Kansas City
    Booth: 350

    Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.

  • ZeroFox
    Booth: 110

    Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.

    Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.

  • Wiz
    Booth: 260

    We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights  that don’t waste time.

    Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Naeem Babri
    President, ISSA KC Chapter

    Naeem Babri is a cybersecurity practitioner who works at T-Mobile, focusing on cyber risk assessments, information security, and cyber security controls. Naeem has worked in IT and cybersecurity for the last 20+ years. His expertise in information security, IT operations, and support has led to various roles at T-Mobile, formerly Sprint. His various Board services include serving as President and advisor of ISSA-KC since 2014, board member for InfraGard, and as an advisor for various conferences. Naeem is an avid runner, enjoys photography, and is an arts patron in addition to his various community projects. He holds a Master's degree in Computer Resource Management and a Bachelor of Science in Mathematics and Computer Science.

  • speaker photo
    Donna Gomez
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District

    Donna Gomez, CRISC, is the Security Risk and Compliance Analyst at Johnson County (KS) Park & Recreation District. Previously, Donna served as the Critical Infrastructure Protection Senior Manager and Risk Compliance Analyst for a municipally owned utility. Donna has been an information security professional since 1999, where she began documenting processes for IT and customer support staff, then training people to not click on suspicious attachments in emails. She served as Past President of the InfraGard Kansas City Members Alliance and is past President of the Greater Kansas City Chapter of ISACA. Donna serves on several of the Multi-State Information Sharing and Analysis Center (MS-ISAC) Working Groups including the Metrics Subcommittee, Security Awareness, and Business Resiliency. Donna also serves as a member of the MARC Cybersecurity Task Force and volunteers with the ISACA Foundation as a mentor and promote diversity and inclusion in the Cyber Risk and Audit profession. She is the Director of Membership & Recruitment for the Kansas City Metroplex for Women in Cybersecurity (WiCyS).

    She previously served as a member of the ASIS Professional Standards Board drafting team developing the Security Awareness Standard published in 2020. Her passion is to continue expanding the information sharing community and build partnerships to help strengthen the security resiliency and awareness of anyone responsible for protecting the critical infrastructure.

  • speaker photo
    David Witte
    Information Security Manager, Jackson County, MO
  • speaker photo
    Corian Kennedy
    Hacker & Founder, SecKC

    Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay one step ahead of cybercriminals. With a current role in advanced research and hacking for one of the most prominent cybersecurity firms in the world, Corian has helped shape the industry's future and continues to push the limits of what is possible in the field of cybersecurity.

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Mike Miller
    Author, "Break In Cyber," vCISO

    Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For more than 25 years, Mike has specialized in both offensive and defensive cybersecurity and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.

  • speaker photo
    Rob Arnold
    Director of Information Security & Privacy Officer, Children International

    Rob Arnold is Director of Information Security at Children International, where his job is protecting the data and systems we use to fight to end global poverty. Twenty-eight years of working in Information Technology in the public and private sector has given Rob the conviction that successful outcomes happen when you don’t let the technology overshadow the people and the process.

  • speaker photo
    Eric Walters
    Director, Cybersecurity & IT Infrastructure, Burns & McDonnell

    A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience includes healthcare cross-disciplinary compliance and privacy, software development, information security program management, cyber security managed services, federal government IT cloud deployments, global transition operations, and 20 years in the military.

  • speaker photo
    Rob Pankau
    Sr. Solutions Engineer, Okta

    Rob is a Senior Solutions Engineer from Okta with over 14 years of experience in Information Technology. His expertise falls with the Identity, Virtualization, and End User Computing spaces in regulated environments. Rob holds a MS of Information Technology Management and BA of Communication from Oakland University. He additionally sits on the Sigma Pi Fraternity Educational Foundation Board that facilitates scholarships and grants for its membership.

  • speaker photo
    Yaron Levi
    CISO, Dolby Laboratories

    Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a Research Fellow for the Cloud Security Alliance, serves as an advisory board member for several information security companies, and is co-founder of the Kansas City CISO forum. He graduated from the FBI CISO academy in 2018, and currently serves on the board of InfraGard KC.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Brian Wasko, Moderator
    Principal Security Program Manager, Microsoft
  • speaker photo
    Joshua Brown
    VP & Global CISO, H&R Block

    Joshua Brown is a Chief Information Security Officer, with deep experience in designing and building information security programs to deliver efficient and effective risk management practices. HIs core expertise is in zero trust design, implementation of data-centric risk mitigation, raising security awareness, and aligning security strategy with business requirements.

  • speaker photo
    Kevin Augspurger
    Director of IT, Unite Private Networks

    Kevin Augspurger is an accomplished IT professional with over 18 years’ experience in the industry, 9 of which have been in the telecommunications field. In his career, Kevin specializes in networking, IT security, server/cloud infrastructure, IT management, and facilities/real estate. Additionally, Kevin holds certifications including Certified Information Systems Security Professional (CISSP), Cisco Certified Network Associate (CCNA) Routing + Switching; CCNA Security; and Microsoft Certified Systems Administrator (MCSA).

    Prior to the start of his career, Kevin studied Computer Science at the University of Kentucky and earned a BA in Film from University of Kansas. Outside of work, Kevin enjoys building arcade systems, volleyball, watching movies, being a dad.

  • speaker photo
    Sara Flores
    Deputy CISO, FNBO Bank
  • speaker photo
    April Boyd-Noronha, Moderator
    Global Diversity & Inclusion Advisor, Board Member, XR Safety Initative (XRSI)

    April Boyd-Noronha, also known as The STEM Broker, consults parents, educational and civic entities on actively engaging the NextGen as they pursue careers in STEM. She is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities.

    April has over 20 years of experience in academia and advanced technologies as an author, college professor, global keynote speaker and thought leader. Her expertise is on the future of work and emerging trends on diversity, equity, inclusion, and accessibility for persons of historically marginalized populations. She also is the new Global Security Awareness Manager for Cardinal Health. April continues to blaze a trail in equitable practices as the first Black elected school board member of the Shawnee Mission School District (SMSD) which is the 3rd largest school district in the state of Kansas. She is the parent of three children who all are pursuing a STEM career track in cybersecurity, engineering, and avionics (drones).

  • speaker photo
    Jim Pointer, Moderator
    Manager, Information Security, Helzberg Diamonds
  • speaker photo
    Wayne Crowder
    VP of Information Security, Shamrock Trading Corporation
  • speaker photo
    VB Malik
    Partner Solutions Architect, Cloudflare

    Vaibhav Malik, also known as "VB," is a seasoned networking and security professional and industry thought leader with over 12 years of experience in the field. He holds a Masters in Telecommunication from the University of Colorado Boulder and an MBA from the University of Illinois Urbana Champaign. Currently, Vaibhav is serving as a Global Partner Solution Architect for Cloudflare, a leading web performance and security company. In this role, he is responsible for working with Cloudflare's global partners to help them design and implement effective security solutions for their customers.

    Prior to his current role, Vaibhav worked at several large service providers, security and networking companies where he played a key role in helping Fortune 500 clients with their network, security, and cloud transformation projects. He is recognized as an expert in Zero Trust Security Architecture and has been an evangelist for the importance of adopting an identity and data-centric approach to security. Vaibhav is a sought-after speaker and has delivered talks on cybersecurity at various industry events and conferences. His expertise and experience in the field make him a valuable asset to any organization looking to improve their cybersecurity posture.

  • speaker photo
    Nader Zaveri
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud

    Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states. He also leads the remediation efforts with his knowledge and experience by providing strategic short, medium, and long-term remediation recommendations to directors and C-level executives. He also leads the efforts in providing tactical recommendations to specialists, to improve the security posture of an organization. Nader also has experience with leading transformational projects over infrastructure and processes with technical and organizational change components in response to rapidly evolving business needs and regulatory requirements. Nader Zaveri conducted interviews and presentations for dozens of organizations and conferences regarding cloud and on-prem Incident Response and Remediation topics. He regularly provides security updates and briefings to C-Suite personnel during and after an incident, as well as assists with post-remediation and hardening efforts for the organization. Prior to joining Mandiant, Nader Zaveri spent several years in leadership positions at major cyber security consulting firms. Before joining consulting, Nader worked as a lead practitioner for multi-national organizations. When Nader is not working, he is helping and mentoring young professionals with their entry into the workforce and Cyber Security. Nader juggles about 5-10 mentees at a time to help them navigate their studies and career paths.

  • speaker photo
    Kashif Zaidi
    Director of Solution Architects, Aqua Security
  • speaker photo
    Tyrone Watson-Ferguson, Moderator
    SVP & CISO, Security Bank of Kansas City
  • speaker photo
    Jason Cradit
    CIO / CTO, Summit Carbon Solutions

    Jason Cradit is a highly-skilled technology executive with a passion for creating innovative solutions in the energy and utilities industry. For two decades, Jason has helped companies use technology to streamline their processes, reduce costs, and increase efficiencies by challenging the status quo and leading teams to set higher bars with modern technologies. He is a versatile executive with experience as a software solutions leader, consultant, and operator. Jason's academic journey includes a bachelor's degree in business management from Baker University, a master's in computer science from the University of Kansas, and a master’s in business administration from Rockhurst University. Additionally, he holds many industry certifications such as CISSP, CCSP, AWS Architect, Azure Architect, and many more.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Field Representative from Local FBI Office
  • speaker photo
    Happy Hour
  • speaker photo
    Sherry Callahan
    CISO, Dairy Farmers of America

    Sherry's management career over the last 20 years has spanned multiple IT service areas including information security, infrastructure support, customer support, and disaster recovery\continuity. Perhaps her proudest accomplishments are the programs and teams that she has built from the ground up and the large-scale projects that she has managed successfully in very challenging and highly-regulated environments including the legal industry, healthcare, Fortune 100 finance and electric/nuclear utilities.

    As a result of these opportunities, she has earned a reputation as a forward-thinking and capable leader who strives for nothing less than outstanding results and is adept at establishing successful information technology, security and compliance programs in support of organizational objectives while managing cost and risk.

  • speaker photo
    Dr. Cheryl Cooper
    Business Information Security Officer (BISO), T-Mobile

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.

  • speaker photo
    Cindi Carter
    CISO & C-Suite Advisor, Check Point Software Technologies

    Cindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive who consistently seeks the optimal outcome for any endeavor. As a transformational leader from startups to enterprises, she excels at building cybersecurity practices in highly-regulated industries, turning strategic goals into actionable outcomes, and highly collaborative engagement across the organization for managing cyber risk.

    At Check Point Software Technologies, Cindi is a Chief Information Security Officer in the Office of the CISO, leading Check Point's Healthcare Center of Excellence where human safety is essential to care.

    Cindi is the founding President of Women in Security - Kansas City, was honored in SC Media magazine’s “Women to Watch in Cyber Security," and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.” She presents at conferences worldwide, holds several recognized IT, security, and project management certifications, and has a Master of Science degree in Information Technology.

  • speaker photo
    Monica Cole-Rowe
    CISO, Mazuma Credit Union
  • speaker photo
    Britney Kennedy
    Global BISO & Director of Business Partnership, Cardinal Health

    Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since transitioned to Cardinal Health, initially leading Cyber Operations and now performing as the Director of Information Security Business Partnerships, providing Business Support, Security Awareness, and Compliance Operations across the Globe. Britney is a certified CISSP, CISM, PMP, SSAP. and holds certifications for CompTIA S+, CCSK, and IT Business Management. She holds a BS in Applied & Discrete Mathematics and an MS in Cybersecurity. Britney was also named an IT Security Power Player by SC Magazine and named as the Security Professional of the Year by ASIS Kansas City Chapter in 2020.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes