googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 7, 2025
    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    9:00 am
    [PLUS Course] Master the Art of Cybersecurity Strategy
    • session level icon
    Build, Lead, Succeed: A Hands-On CISO Strategy Workshop
    speaker photo
    CISO, Dolby Laboratories
    speaker photo
    CISO, i3 Verticals
    speaker photo
    Founder, WhatsNextBiz
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    You’ve landed the coveted Chief Information Security Officer (CISO) role—now what? The cornerstone of every CISO’s success is crafting a security strategy that aligns with their organization’s unique needs. But where do you begin?

    Join seasoned CISOs Yaron Levi, Neil Watkins & Elizabeth Souder in an intensive, hands-on workshop designed to equip you with the tools and frameworks to build a cybersecurity strategy that works for your organization.

    In this interactive session, you will:

    • Define your organization’s risk appetite.
    • Identify the controls and capabilities needed for robust cybersecurity.
    • Develop a purpose-driven strategy with clear principles and priorities.

    By the end of the day, you will have created an actionable cybersecurity strategy tailored to your organization. You will also present your strategy for expert feedback and collaborate with peers to refine your approach.

    This workshop is designed for acting CISOs or experienced security practitioners who aspire to lead at the highest level.

    Agenda:

    • 9:00–10:00 AM: Strategy Fundamentals—Insights from the Experts
    • 10:00–12:00 PM: Group Work—Building Your Strategy
    • 12:00–1:00 PM: Lunch
    • 1:00-3:00 PM: Strategy Presentations, Feedback, and Winner Announcement

    Seats are limited—Reserve your spot now!
    With only 20 participants (5 groups of 4), this workshop offers personalized attention and invaluable insights from experts. Don’t miss this opportunity to accelerate your career and strengthen your organization’s security posture.

  • Thursday, May 8, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Enterprise KC Chapter Meeting: Long Ago, in the Heartland of Cybersecurity…
    • session level icon
    speaker photo
    Director, Heartland Cyber Range, EnterpriseKC
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Every region has a cyber story—what’s yours? Join us for an interactive update on how Kansas and Missouri are rewriting the narrative around cybersecurity education, workforce development, and innovation. We’ll share the latest updates on the Heartland Cyber Range and EnterpriseKC’s broader efforts to cultivate talent and enhance the region’s cyber ecosystem. Along the way, we’ll highlight lessons learned, emerging trends, and ways the local cybersecurity community can help shape the future. Whether you’re a long-time supporter or just discovering this work, this is your invitation to be part of the story.
    8:00 am
    WiCyS and ISSA Joint Chapter Meeting (Open to all attendees)
    • session level icon
    Once Upon a Breach: Defending the Kingdom of Critical Infrastructure from Ransomware Sorcery
    speaker photo
    President, WiCyS Kansas City Metroplex
    speaker photo
    President, ISSA KC Chapter
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Once upon a time, in a sprawling kingdom of Operational Technology (OT), a sinister threat loomed over its most vital domains. Cyber sorcerers, wielding the dark arts of ransomware spells, crept through the hidden passageways between IT and OT networks, seeking to ensnare control systems and disrupt critical infrastructure.  The kingdom’s industrial fortresses, from energy grids to water treatment plants, faced relentless attacks. As these malevolent forces exploited vulnerabilities, defenders struggled to maintain their strongholds, uncovering the grim reality that IT-based security alone was insufficient to protect OT assets.

    But fear not! A council of cybersecurity warriors and strategists has assembled, determined to break the ransomware curse and fortify the realm against future assaults. In this session, attendees, whether battle-hardened OT defenders or strategic analysts, will embark on an epic quest.

    This cybersecurity fairytale is not merely about protecting a mythical castle, it’s about securing the foundations of modern civilization from increasingly sophisticated ransomware threats. Prepare to step into the battle for OT security, your fate as a cyber warrior awaits!

    But wait, there’s more! We have developed a companion guide to complement our PowerPoint presentation. Within this guide is a self-assessment tool for organization’s to assess readiness to protect, respond, and recover from an attack on OT (Critical Infrastructure).

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] State of the Cyber Union: Kansas' Vision for the Future of Cybersecurity
    • session level icon
    speaker photo
    CISO, State of Kansas
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    As the CISO for the State of Kansas, John Godfrey is at the helm of a transformative cybersecurity strategy that is reshaping how the state approaches critical infrastructure, threat intelligence, and public-private partnerships. In this keynote, John will provide an exclusive “State of the Cyber Union” address, outlining the key initiatives driving Kansas’ cybersecurity future. From implementing 14 new state cyber policies to advancing the state’s cyber framework with NIST CSF, John will share his vision for a more resilient digital landscape.

    Attendees will gain insights into Kansas’ robust funding initiatives, including a large grant program aimed at boosting local cybersecurity programs and fostering collaboration across sectors. Additionally, John will discuss the state’s approach to threat intelligence sharing, external attack surface monitoring, and tabletop exercises to prepare for emerging threats. This session is a must-attend for anyone looking to understand the future of state-level cybersecurity and the bold steps Kansas is taking to stay ahead of the curve.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] It Takes All of Us to #SecureOurWorld – Help CISA Reduce Risk to America's Digital Infrastructure
    • session level icon
    speaker photo
    Region 7 Acting Chief of Cybersecurity, DHS CISA
    speaker photo
    Region 7 Deputy Director, DHS CISA
    speaker photo
    Director, Region 7, DHS CISA
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    We need your help. Security experts with the Cybersecurity and Infrastructure Security Agency (CISA) are working to secure our nation’s cybersecurity, but we can’t do it alone. We need YOU to help us educate others, and we need everyone to take steps to help make themselves more secure online. That’s the purpose of the Secure Our World program. Secure Our World provides no-cost ways for individuals, businesses, and organizations to take the steps needed to reduce our collective cyber risk. Together we can secure America and secure our world.

    10:15 am
    The Only Winning Move Is to Play
    • session level icon
    speaker photo
    Founder, SecKC
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    In #deucedeuce , I dropped HackGPT. There was no roadmap. Just weaponized ideas and shenanigans to manipulate and operationalize generative AI by removing its rules. It worked, and the attackers noticed. They even asked me for tech support. Then, all of a sudden, everyone was a cop.

    It’s no longer red vs. blue. It’s AI vs. AI, spy vs. spy, with no off switch.

    While cyber defense teams were debating ethics, and naysayers nayed, haKCers barged through yelling in your voice “LEROY JENKINS.”

    Now, look at what we face. WormGPT mutates payloads. FraudGPT copies your boss’s voice. Red teams and attackers launch agents that never stop scanning. Blue teams remind everyone they said, “Told ya this $h*t was fragile,” back when Leadership didn’t even allow an Nmap scan because it would knock things over.

    It’s time to capitalize on all the advancements and take action. Let’s mess with attackers and waste their time. I’ll show you how, don’t worry. haKC.ai is everything everywhere all at once. Every move attackers make is now weaponized against them.

    Just wait until you see what AI-driven pentest tools are capable of. They verify risk like they already have access and will teach you a thing or two about a thing or two.

    In this session, we will discuss:

    • What HackGPT exposed about moderation, misuse, and failure to prepare
    • How AI tools outpaced the rules meant to govern them
    • Why deception beats detection
    • How haKC.ai captures attackers by being too real to ignore
    • Why the future of pentesting is logic, not labor

    Why don’t you already have an army of AI agents doing your bidding?

    10:15 am
    Rethinking Security for the Modern Enterprise: A Strategic Lens for Enterprise Security Professionals
    • session level icon
    speaker photo
    Sr. Solutions Architect, Cybersecurity, C1
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    As digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.

    We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.

    Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.

    Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Protecting Your AI-Powered Chatbots Against New Attack Types
    • session level icon
    speaker photo
    Principal Product Security Architect, Bayer
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    This session discusses specific ways that many of these new tools that are used to power your organization’s AI-powered chatbots can easily lead to data leakage or reputational brand damage. We will also give a demonstration of exploiting a running chatbot and follow up with mitigation tactics, techniques, and patterns that you can apply.

    Key take-away: Attendees will walk away with actionable steps that can be taken to help mitigate these attacks.

    Presentation Level: TECHNICAL (deeper dive including TTPs)

    11:10 am
    From Security Metrics to Business Impact: Quantifying Cyber Risk for Technical Teams
    • session level icon
    speaker photo
    CISO, Delta Dental Plans Association
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    This session tackles our industry’s persistent challenge: communicating complex security risks in business-relevant terms. Discover how modern risk quantification approaches can transform your technical security findings into compelling business narratives that drive action. We’ll demonstrate practical approaches to quantify potential losses from security events, build data-driven cases for security investments, and move beyond qualitative heat maps and traffic lights. Through real-world examples, attendees will learn to connect technical vulnerabilities to specific business impacts, effectively advocate for resources, and align security priorities with organizational risk tolerance. Leave with actionable frameworks to transform how you communicate security risks to stakeholders and drive more informed decision-making across your organization.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Senior Product Marketing Manager, AppOmni
    speaker photo
    Team Leader of Information Security, Garmin International
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Cyber World on Fire: A Look at Internet Security in Today’s Age of Conflict
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    This informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.

    Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.

    He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Leadership: The Cornerstone of Cybersecurity Success
    • session level icon
    speaker photo
    CISO, Veterans United Home Loans
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Each generation brings unique strengths, perspectives, and challenges. Leading a diverse, multigenerational team requires more than just understanding technology—it requires understanding people. The strategies that resonate with seasoned professionals likely differ from those that inspire the youngest members of your team.

    When you also consider the impact of technology and the pace of change brought about by that technology, interesting trends and patterns emerge. As leaders better understand those trends and patterns, they lead their teams to be much higher performing. The ultimate result is happier, more productive employees, higher retention and better recruiting possibilities.

    In this session, we’ll explore why leadership is the foundation of every successful cybersecurity initiative. We’ll also dive into the nuances of leading across generations, offering proven tactics to effectively manage, motivate, and unify your team. Discover how to harness the potential of every team.

    1:15 pm
    Once Upon a Breach: A Fairytale Cyber Crisis
    • session level icon
    speaker photo
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District
    speaker photo
    Team Leader of Information Security, Garmin International
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Session details to come.

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Cyber Incident Response Planning—More Important than Ever Before
    • session level icon
    speaker photo
    Sr. Systems Director, Cyber Security, Saint Francis Health System
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Even if you don’t have a best practice cybersecurity framework in place, you must have a best practice security incident response plan in place. The plan sets the tone at the top, it highlight framework gaps, and it utilizes tools such as training and table top exercises to help focus on priorities. It is whistleblowing without blowing the whistle.

    A best practice cybersecurity incident response plan must be founded in recognized and accepted industry standards. Standards such as the U.S. National Institute of Standards and Technologies (NIST) 800–61R3 for incident response and the NIST 800–53 for cybersecurity best practice controls must be referenced. These two key NIST documents highlight the critical components required to build an institution’s best cybersecurity framework.

    2:10 pm
    The Sword in the Stone in Cyber: Forging a Resilient Workforce Talent Pipeline
    • session level icon
    speaker photo
    Manager, Strategic Cybersecurity & AI Product Owner, EnterpriseKC
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    In the timeless legend of King Arthur, the Sword in the Stone was more than just a mystical object—it symbolized destiny, potential, and the rightful passage of leadership. Just as Arthur was chosen for his unique qualities, today’s cybersecurity landscape demands an approach that identifies and nurtures emerging talent, ensuring that the next generation of cyber guardians is ready to lead with resilience and innovation.

    This title parallels the magical act of drawing the sword and the strategic process of workforce talent pipeline development and training in cybersecurity. It emphasizes the following key ideas:

    • Identifying the Right Talent
    • Accelerated Skill Development
    • Diverse Cyber Roles and Specializations
    • Nurturing Emerging Leaders
    • Ensuring Continuity and Resilience
    • Empowering Through Transformation

    “The Sword in the Stone of Succession Planning in Cyber” encapsulates the magic and imperative of strategic talent development across the full spectrum of cybersecurity roles. It serves as a call to action for organizations to invest in their most valuable asset—their people—ensuring that they are equipped, empowered, and ready to defend the digital realm now and in the future.

    2:10 pm
    [Panel] Navigating the Cybersecurity Career Path: Perspectives from Entry-Level to Seasoned Professionals
    • session level icon
    speaker photo
    Director, Information Security, Greater Kansas City Community Foundation | Greater Horizons
    speaker photo
    COO, Tenfold Security, Board of Trustees, University of Saint Mary
    speaker photo
    IT Support Analyst, Kansas Bureau of Investigation (KBI)
    speaker photo
    Engineering Instructor, St. Teresa’s Academy
    speaker photo
    Systems Trainer, Amusement Connect LLC
    speaker photo
    Sr. Engineer, Information Security & Risk, and Cybersecurity Awareness Lead, Cardinal Health; Principal, The STEM Broker, LLC
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    In this engaging fireside chat, we bring together a diverse group of women from across the cybersecurity industry to share their experiences and insights. The panel will feature three early-career women and three seasoned professionals, offering a unique blend of perspectives on navigating a career in cybersecurity, STEM, and IT.

    From overcoming challenges and breaking into the industry to advancing to leadership roles, the conversation will explore the key milestones and pivotal moments in each stage of a cybersecurity career. Whether you’re just starting out or looking to level up, this session provides invaluable advice for women at every stage of their journey in the fast-paced and dynamic world of cybersecurity.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 4:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    3:30 pm
    [Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in Cybersecurity
    • session level icon
    speaker photo
    CISO, National Association of Insurance Commissioners (NAIC)
    speaker photo
    Global BISO & Director of Business Partnership, Cardinal Health
    speaker photo
    CISO, Burns & McDonnell
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    As the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.

    Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.

Exhibitors
  • AppOmni
    Booth: 230

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • C1
    Booth: 210

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Cloudaware
    Booth: 270

    Cloudaware LLC was founded in 2011.

    Cloudaware provides a software-defined ITIL-based framework for digital infrastructure management. The world’s largest cloud consumers adopt our Integrated Cloud Service Management platform to streamline daily cloud operations.

    Cloudaware has a strategic partnership with AWS, Microsoft Azure and Google Cloud. As the advanced technology partner, Cloudaware supports new services and features prior to general availability. We keep up with the rapidly innovating cloud industry by releasing new functionalities on a regular basis.

    Cloudaware partners with New Relic and PagerDuty. By integrating our Asset Management and Resiliency Optimization with partner-enabled technologies, we help customers achieve operational excellence in modern self-service environments.

  • Compyl
    Booth: 290

    Eliminate the need for multiple security tools, gain enterprise-level insights, and grow with a scalable GRC ecosystem. Compyl monitors and assigns workflows in a single location to ensure regulatory requirements and IT frameworks are continuously met by establishing a proper information security foundation across the entire organization.

  • Cyberhaven
    Booth: 220

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Digital Hands
    Booth: 240

    Digital Hands is how you finally get MDR with the flexibility, fine-tuning, and support needed to make it work in your specific environment. We call it Real-World MDR.

    Too many companies get excited about the promise of MDR, only to be disappointed by MDR’s missing pieces. Where are the custom playbooks? The expert guidance? Firewall management? How do you handle the sheer volume of alerts? Why won’t this play nice with your tech stack? And on and on it goes. Meanwhile, the bad actors are becoming more and more sophisticated with AI and automation. So, you’ve got to think fast, act fast, and flex fast. That’s why organizations with some of the most sensitive data of all – such as hospitals, financial institutions, law firms, and government agencies – continue to give us industry-leading satisfaction sentiments year after year after year.

  • EnterpriseKC
    Booth: 120

    EnterpriseKC is a business-led, systems driven, “think and do” tank focused on enterprise development, innovation, and job growth within high value, high opportunity industry clusters. We work directly with business, academia, and government to understand current cluster ecosystems and to advance strategies and programs that result in accelerated enterprise growth and economic prosperity throughout Kansas and Western Missouri.

  • Exabeam
    Booth: 260

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Expel
    Booth: 180

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • InfraGard Kansas City
    Booth: 110

    InfraGard Kansas City Members Alliance (IMA) is a non-profit organization serving as a public-private partnership among U.S. businesses, individuals involved in the protection and resilience of U.S. critical infrastructures, and the Federal Bureau of Investigation.

    The InfraGard program is a public/private cooperative effort dedicated to improving our national security. InfraGard consists of Chapters throughout the United States and has thousands of members. The FBI leads the U.S. Government side of InfraGard. The private sector side of InfraGard is led by a non-profit corporation, the InfraGard National Members Alliance, which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “Chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together. “InfraGard” is a registered service mark of the FBI.

  • ISACA Kansas City
    Booth: 160

    Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.

  • ISC2 Kansas City Chapter
    Booth: 150

    The mission of ISC2 Kansas City (KC) Chapter is to advance the Information Security Profession by leveraging our shared body of knowledge to better our communities, groom the next generation of security professionals by delivering solutions to real-world security problems and issues that our members face.

    “We” began as a few security-minded friends that worked together.  We decided to quit talking about launching a local ISC2 chapter in Kansas City or worse yet, wait around for someone else to do it for us.  We stepped up and took the initiative.  We have been growing as others hear about our group and join with us.

  • ISSA Kansas City
    Booth: 140

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

  • National Cybersecurity Alliance
    Booth: n/a

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Ping Identity
    Booth: 170

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • Tevora + ProcessUnity
    Booth: 190

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.

    ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.

  • ThreatLocker
    Booth: 200

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS Kansas City Affiliate
    Booth: 130

    We are the Kansas City Metroplex affiliate of WiCyS serving 14 counties across Kansas and Missouri.

    Women in Security (WiCyS) helps build a strong cybersecurity workforce with gender equality by facilitating recruitment, retention and advancement for women in the field. WiCyS offers mentoring, training programs, scholarships, virtual and in-person conferences, leadership series, career fairs, webinars, and more to women at all stages of their cybersecurity career journey!

    Women in Cyber Security (WiCyS) is the premier organization with national reach dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking and mentoring. WiCyS is a non-profit organization offering many membership, sponsorship and collaboration benefits.

    As a member of WiCyS, you have access to all the resources and opportunities provided by our network. From community groups to career fairs, scholarships to speaking opportunities, and much more, we’re here to support your growth in the field of cybersecurity.

    WiCyS is the only non-profit membership organization with global reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.

    Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community.

  • Women in Security – Kansas City
    Booth: 100

    Here at Women in Security – Kansas City, our mission is to provide a focus for women in Information Security through peer mentoring, workshops, and networking opportunities. Our vision for Women in Security – Kansas City is to inspire and support women at all career levels in Information Security.

  • Zluri
    Booth: 280

    Next-Gen Identity Governance & Administration platform for IT & Security teams to discover identities & applications, streamline access management, and automate access reviews in one single place

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Yaron Levi, Instructor
    CISO, Dolby Laboratories

    Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a Research Fellow for the Cloud Security Alliance, serves as an advisory board member for several information security companies, and is co-founder of the Kansas City CISO forum. He graduated from the FBI CISO academy in 2018, and currently serves on the board of InfraGard KC.

  • speaker photo
    Neil Watkins, Instructor
    CISO, i3 Verticals
  • speaker photo
    Elizabeth Souder, Instructor
    Founder, WhatsNextBiz

    As a classically trained attorney, Elizabeth advises and consults with leaders and teams to realign the disconnect between their stated values and goals and the operations and behaviors that represent them in the real world. She has guided some of Kansas City’s leading organizations through launching, preparing for growth and expansion, addressing COVID-19 and post-COVID challenges, reimagining their identity, restructuring operations, and rebuilding workplace culture.

    She thrives on working with leaders, new managers, and their teams to build teamwork, align and operationalize core values, empower each other, and achieve collective success.

    With over 20 years of experience as a corporate lawyer for some of Kansas City’s largest employers, she has seen firsthand how organizational health and alignment directly impact success. Her background as a collegiate and lifelong athlete underscores the vital connection between health and performance. Translating these principles into a business context revealed that an intentional commitment to core values, aligned with strategic goals, informs every decision and action of effective leaders and thriving organizations.

    She founded What’s Next Biz to foster happier and healthier workplaces by bridging the gap between legal obligations and business operations & culture. This comprehensive approach emphasizes the importance of each step in a business’s journey, not just the end goal. As John Wooden famously announced to each of his freshman basketball players, "winning championships begins with learning how to tie your shoe laces."

  • speaker photo
    Dr. Chuck Gardner
    Director, Heartland Cyber Range, EnterpriseKC

    Dr. Gardner is the Director of the Heartland Cyber Range at EnterpriseKC. Chuck develops a curriculum that provides an immersive cybersecurity learning experience, equipping learners with real-world defense skills and research capabilities. He plays a key role in identifying and nurturing high-potential cyber talent across the region.

    Before joining EnterpriseKC, Chuck spent a decade in K-12 education, followed by nine years at CYBER.ORG, where he developed a national cybersecurity curriculum and supported educators, school districts, state departments of education, and regional and federal partners in building cybersecurity capacity. Since 2016, he has also led a landmark initiative with Virginia’s Department for the Blind and Vision Impaired, delivering accessible cybersecurity education to more than 120 students statewide.

  • speaker photo
    Dr. Cheryl Cooper, CISSP
    President, WiCyS Kansas City Metroplex

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.

  • speaker photo
    Naeem Babri
    President, ISSA KC Chapter

    Naeem Babri is a cybersecurity practitioner who works at T-Mobile, focusing on cyber risk assessments, information security, and cyber security controls. Naeem has worked in IT and cybersecurity for the last 20+ years. His expertise in information security, IT operations, and support has led to various roles at T-Mobile, formerly Sprint. His various Board services include serving as President and advisor of ISSA-KC since 2014, board member for InfraGard, and as an advisor for various conferences. Naeem is an avid runner, enjoys photography, and is an arts patron in addition to his various community projects. He holds a Master's degree in Computer Resource Management and a Bachelor of Science in Mathematics and Computer Science.

  • speaker photo
    John Godfrey
    CISO, State of Kansas
  • speaker photo
    John Bryant
    Region 7 Acting Chief of Cybersecurity, DHS CISA

    Mr. John Bryant serves as the Region 7 Acting Chief of Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA), Integrated Operations Division in the U.S. Department of Homeland Security (DHS). Region 7 is headquartered in Kansas City, Missouri, and serves the states of Iowa, Kansas, Missouri, and Nebraska. CISA is the Nation’s risk advisor, working with partners to defend against today’s digital and physical threats and collaborating to build more secure and resilient infrastructure
    for the future. Mr. Bryant provides Cybersecurity resource briefings, Cybersecurity training, Cybersecurity assessments, and Incident Response planning to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.

    Before his tenure with CISA, Mr. Bryant working for the U.S. Army as the Army University Chief Information Officer (CIO) with the main campus at Ft. Leavenworth and five remote campuses. Prior to joining the U.S. Army, Mr. Bryant began his career in U.S. Naval Intelligence, where he served nine (9) years. Following his Naval Service, he held various IT positions in both the Private and Government sectors, which includes 9 years in Cybersecurity, 8 years in IT Management, and 8 years as CIO for three different organizations.

    He holds a Master of Business Administration with an emphasis in Organizational Development and a Bachelor of Science in Computer Information Technology from Upper Iowa University. He is a member of (ISC)2 and is a Certified Information System Security Professional (CISSP) in good standing for the past 12 years.

  • speaker photo
    Ethan Cole
    Region 7 Deputy Director, DHS CISA

    Mr. Ethan Cole serves as Deputy Regional Director for the U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Region 7 in Kansas City, Missouri. In this role, he oversees a regional team serving Iowa,
    Kansas, Missouri, and Nebraska. The CISA Region 7 team provides expert advice on physical and cybersecurity risk assessment and mitigation; information sharing and outreach; training and exercises; chemical security; emergency communications; and infrastructure resilience.

    Mr. Cole joined CISA in 2022 and has served in various federal leadership positions during his career. Prior to joining CISA, he worked at the USDA Farm Production and Conservation Business Center. Working in the Financial Management Division (FMD), he implemented FMD’s first three Robotic Process Automation (RPA) bots, coordinated the program delivery for multi-million- and billion dollar farm programs, and and served as the acting Accounting Policy Section Chief.

    From 2012 through 2020, Mr. Cole served the U.S. Citizenship and Immigration Services, National Records Center (NRC) in various leadership positions ranging from Administrative Manager, Chief of Staff, Deputy Director, and acting NRC Director. He led over 400 employees and 400 contractors at a level-4 secure facility responsible for the logistics, maintenance, and security of nearly 18 million classified and unclassified immigration records and ensured timely access to immigration records to nearly 300 USCIS offices worldwide while also leading the largest Freedom of Information Act (FOIA) program in the federal government. While at USCIS, Mr. Cole completed the Federal Executive Institute’s Leadership for a Democratic Society leadership program.

    Mr. Cole started his federal career in 2002 as a Federal Career Intern Program (FCIP) Intern with the U.S. Treasury, Financial Management Service (FMS), Kansas City Financial Center (KCFC). He spent over 10 years there and held various responsibilities at the KCFC. He started out conducting comprehensive international payments accounts reconciliations, teaching appropriations Law, and conducting public outreach and education for Treasury programs. Mr. Cole progressed into numerous leadership positions including international payments operations management, domestic payments operations management, and administrative operations management.

    Mr. Cole went to college and played baseball at Southwest Baptist University while earning his Bachelor of Science degree in Community Recreation, with a minor in Business Management. Ethan and his spouse, Ashleigh, live with their four boys in Lee’s Summit, Missouri.

  • speaker photo
    Phil Kirk
    Director, Region 7, DHS CISA

    Phil Kirk is the Region 7 Director for the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. Department of Homeland Security (DHS). Region 7 is headquartered in Kansas City, Missouri, and serves the states of Iowa, Kansas, Missouri and Nebraska. CISA is the Nation’s risk advisor, working with partners to defend against today’s digital and physical threats and collaborating to build more secure and resilient infrastructure for the future.

    Through leadership and management of field-based resources and capabilities, Regional Directors guide all of CISA’s numerous and varied programs. Mr. Kirk was selected as Regional Director of the Office of Infrastructure Protection in the National Protection and Programs Directorate (NPPD) of DHS in 2016, prior to the creation of CISA through the Cyber Security and Infrastructure Security Act of 2018. He then served as the Acting Director of CISA Region 7 for two years until his appointment to the Senior Executive Service in January 2021. He is the senior CISA official in the region and is accountable for the execution of programs to defend critical infrastructure against the threats of today, while coordinating and collaborating with partners across all levels of government and in the private sector to secure against evolving threats of tomorrow. He serves as the senior advisor and liaison between DHS and senior federal, state, local, and tribal governments and private sector officials on matters relating to the security and resiliency of nationally, regionally, and locally significant critical infrastructure. Mr. Kirk is also responsible for directing incident management activities as they relate to critical infrastructure restoration and resilience.

    Previous to his tenure with CISA, Mr. Kirk spent over 20 years of his federal career in a diverse and progressive set of positions in the Federal Emergency Management Agency (FEMA) in Region 7, most recently as the Federal Preparedness Coordinator and National Preparedness Division Director. In this position, Mr. Kirk served as a consultant and the principal advisor to the FEMA Regional Administrator regarding all preparedness matters. He led multiple programs and initiatives to strengthen, integrate, and operationalize the preparedness efforts of the region to build preparedness capabilities across all levels of government, jurisdictions, disciplines, critical infrastructure sectors, and citizen groups.

    Before being named the first Federal Preparedness Coordinator in 2008, he served as the Chief of the Response Branch in the Response and Recovery Division. Prior to that assignment, Mr. Kirk was a Branch Chief in the Mitigation Division for five years. Mr. Kirk began his career in FEMA in 1994 as the Public Affairs and Congressional Liaison Officer.

    In 1998, Mr. Kirk left FEMA and moved to Washington, DC, where he held the position of Intergovernmental Relations Manager for the U.S. Chemical Safety and Hazard Investigation Board, a then new independent federal agency, with the mission of ensuring the safety of workers and the public by reducing the number and severity of industrial chemical accidents. After serving a year in this position, Mr. Kirk returned to FEMA.

    Prior to joining FEMA, Mr. Kirk was the District Director for a Member of the U.S. House of Representatives from the state of Kansas and was employed by the Congressman for nearly six years, starting in 1989.

    Mr. Kirk holds a Master of Arts in Security Studies from the Naval Postgraduate School Center for Homeland Defense and Security. He obtained his Bachelor of Science degree in Agricultural Economics from Kansas State University. Mr. Kirk and his spouse, Shelly Kirk, reside in Oak Grove, Missouri.

  • speaker photo
    Cory Kennedy
    Founder, SecKC
  • speaker photo
    Caheen Murphy
    Sr. Solutions Architect, Cybersecurity, C1

    Caheen Murphy is a highly experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.

  • speaker photo
    Bill Horn
    Principal Product Security Architect, Bayer

    Bill is an IT professional with over 20 years of experience driving DevOps, secure SDLC, cloud security, and security architecture initiatives. Holding both a Bachelor's and Master's degree in Cybersecurity and Information Assurance, he brings a strong academic foundation to his work. Bill's certification portfolio includes CISSP and GWAPT, among others. As a recognized expert, he regularly shares his insights as a presenter at his company's Security Champions speaker series.

  • speaker photo
    Alex Green
    CISO, Delta Dental Plans Association

    Alex K. Green is a distinguished cybersecurity leader who currently serves as the Chief Information Security Officer at Delta Dental Plans Association. With expertise in merging cybersecurity initiatives with business objectives, Alex leads comprehensive security strategy development and unifies diverse security teams toward common business goals. His professional background includes significant roles at DST Systems and H&R Block, where he developed his skills in cybersecurity operations and engineering team management. Beyond his corporate responsibilities, Alex is an entrepreneur who contributes as an advisor to startup companies and venture capital firms, driving support to those building innovative solutions in cybersecurity. His educational foundation includes an Executive MBA and a Master's in Intelligence Management, which complement his military experience in the Army's 75th Ranger Regiment, where he specialized in electronic exploitation.

  • speaker photo
    Panel Discussion
  • speaker photo
    Brittany Bodane
    Senior Product Marketing Manager, AppOmni

    Brittany Bodane is a Senior Product Marketer at AppOmni, where she works closely with security leaders, customers, and partners to better understand and communicate evolving SaaS security challenges. She translates these insights into strategies and education that help organizations secure their SaaS environments. Passionate about learning from security experts, she shares that knowledge to help protect user data and strengthen SaaS security practices.

  • speaker photo
    Reanna Schultz, Moderator
    Team Leader of Information Security, Garmin International

    Reanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.

    Throughout her career, Reanna has worn many hats, including roles in Endpoint Security Engineering, Detection Engineering, and leading a Security Operations Center (SOC) team. In addition to her primary responsibilities, Reanna serves as an adjunct professor at the University of Central Missouri (UCM) and is also an entrepreneur.

    Reanna is the founder of CyberSpeak Labs, a platform dedicated to fostering community engagement through collaboration. She hosts the podcast Defenders in Lab Coats, where she delves into cyber threats and occasionally invites passionate guests to share their insights.
    Driven by her passion for cybersecurity, Reanna frequently travels to speak at events, sharing her industry knowledge and empowering others to improve their organizations' cybersecurity practices.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Donna Gomez
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District

    Donna Gomez, CRISC, is the Security Risk and Compliance Analyst at Johnson County (KS) Park & Recreation District. Previously, Donna served as the Critical Infrastructure Protection Senior Manager and Risk Compliance Analyst for a municipally owned utility. Donna has been an information security professional since 1999, where she began documenting processes for IT and customer support staff, then training people to not click on suspicious attachments in emails. She served as Past President of the InfraGard Kansas City Members Alliance and is past President of the Greater Kansas City Chapter of ISACA. Donna serves on several of the Multi-State Information Sharing and Analysis Center (MS-ISAC) Working Groups including the Metrics Subcommittee, Security Awareness, and Business Resiliency. Donna also serves as a member of the MARC Cybersecurity Task Force and volunteers with the ISACA Foundation as a mentor and promote diversity and inclusion in the Cyber Risk and Audit profession. She is the Director of Membership & Recruitment for the Kansas City Metroplex for Women in Cybersecurity (WiCyS).

    She previously served as a member of the ASIS Professional Standards Board drafting team developing the Security Awareness Standard published in 2020. Her passion is to continue expanding the information sharing community and build partnerships to help strengthen the security resiliency and awareness of anyone responsible for protecting the critical infrastructure.

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin International

    Reanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.

    Throughout her career, Reanna has worn many hats, including roles in Endpoint Security Engineering, Detection Engineering, and leading a Security Operations Center (SOC) team. In addition to her primary responsibilities, Reanna serves as an adjunct professor at the University of Central Missouri (UCM) and is also an entrepreneur.

    Reanna is the founder of CyberSpeak Labs, a platform dedicated to fostering community engagement through collaboration. She hosts the podcast Defenders in Lab Coats, where she delves into cyber threats and occasionally invites passionate guests to share their insights.
    Driven by her passion for cybersecurity, Reanna frequently travels to speak at events, sharing her industry knowledge and empowering others to improve their organizations' cybersecurity practices.

  • speaker photo
    Konnor Andersen
    VP, Sales, Zluri

    Konnor is the Vice President of Worldwide Sales & Partnerships at Zluri, an identity security platform helping IT and security teams manage and secure SaaS applications. With nearly a decade in tech sales and leadership—from early-stage startups to $10B+ public companies—he brings extensive experience in scaling teams and driving growth. Konnor is passionate about building high-performing teams and shares insights on leadership and team building in today’s dynamic workplace.

  • speaker photo
    Stas Bojoukha
    CEO, Compyl
  • speaker photo
    Panel Discussion
  • speaker photo
    Jim Garrett
    Sr. Systems Director, Cyber Security, Saint Francis Health System

    Jim Garrett is an IT executive, leader, architect, and governance expert with enterprise executive experience at the Saint Francis Health System, State of Missouri, New York State, 3M, Honeywell, Ingram Micro, Washington Mutual, and Maytag. Also significant healthcare consulting experience at MediSys Health Network, Salinas Valley Memorial Healthcare System, Saint Luke’s Health System, University of Washington Medical School, and University Hospital Rutgers. Technical and process experience includes deployment of enterprise wide IT Applications, Cyber Security Frameworks, Awareness and Training, Incident Event Management (SIEM), Identity and Access Management (IAM), Password Access Management (PAM), 2FA, Security Operation Center (SOC), Unified Threat Management (UTM), Web Application Firewalls (WAF), Data Leakage Prevention (DLP), Anti-ZeroDay, and Encase Enterprise Forensic technologies in multi-national environments. Operational responsibility for SAP and EPIC security and system provisioning and compliance requirements. Lean Sigma and Six Sigma process improvement experience.

  • speaker photo
    Maria Singh
    Manager, Strategic Cybersecurity & AI Product Owner, EnterpriseKC

    Maria Singh is a visionary cybersecurity and AI innovator at EnterpriseKC, leading transformative initiatives on the Heartland Cyber Range. EnterpriseKC is a business-led think-and-do tank driving enterprise development, innovation, and job growth. It maximizes regional prosperity by accelerating growth, retaining jobs and talent, expanding enterprises, and supporting startups and high-growth companies through targeted strategies and programs.
    As the Cybersecurity Content Strategy Manager and Product Owner, Maria crafts dynamic training content and forges strategic partnerships with the government, industry, and academia. Much like the legendary Sword in the Stone, she is a beacon of transformation, countering emerging cyber threats and empowering the next generation of cyber practitioners to lead with resilience and vision.

    An accomplished author, speaker, and mentor, Maria is deeply committed to inspiring future generations. She has a passion for increasing the representation of women in cybersecurity. She also lends her expertise to developing AI chat agents to streamline operations, personalize customer experiences, and accelerate value creation.

  • speaker photo
    Naheed Bleecker
    BISO, RWE
  • speaker photo
    Holly Giammanco
    Director, Information Security, Greater Kansas City Community Foundation | Greater Horizons
  • speaker photo
    Aaron Weissenfluh
    COO, Tenfold Security, Board of Trustees, University of Saint Mary

    Aaron cofounded Tenfold Security after serving thirteen years as the Chief Information Security Officer of American Century Investments and Cboe Global Markets (previously Bats Global Markets). He joined Bats Global Markets in 2008 and built the information security program from the ground up. Following the acquisition of Bats Global Markets by the Chicago Board Options Exchange (CBOE), he became the Global Chief Information Security Officer of the combined entity. In his role, he oversaw all information and physical security along with environmental, security compliance, personnel security, monitoring and policy/procedure.

    Aaron holds an MBA and bachelor’s in education from the University of Saint Mary and a Bachelor’s in Telecommunications Management from DeVry University. He currently serves as a board member of the University of Saint Mary Board of Trustees and maintains a CISSP certification.

  • speaker photo
    Yvette Karanja
    IT Support Analyst, Kansas Bureau of Investigation (KBI)
  • speaker photo
    Lillia Nelson
    Engineering Instructor, St. Teresa’s Academy
  • speaker photo
    Zaria Noronha
    Systems Trainer, Amusement Connect LLC
  • speaker photo
    April Boyd-Noronha, Moderator
    Sr. Engineer, Information Security & Risk, and Cybersecurity Awareness Lead, Cardinal Health; Principal, The STEM Broker, LLC

    April Boyd-Noronha, also known as The STEM Broker, consults parents, educational and civic entities on actively engaging the NextGen as they pursue careers in STEM. She is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities.

    April has over 20 years of experience in academia and advanced technologies as an author, college professor, global keynote speaker and thought leader. Her expertise is on the future of work and emerging trends on diversity, equity, inclusion, and accessibility for persons of historically marginalized populations. She also is the new Global Security Awareness Manager for Cardinal Health. April continues to blaze a trail in equitable practices as the first Black elected school board member of the Shawnee Mission School District (SMSD) which is the 3rd largest school district in the state of Kansas. She is the parent of three children who all are pursuing a STEM career track in cybersecurity, engineering, and avionics (drones).

  • speaker photo
    Happy Hour
  • speaker photo
    Monica Cole-Rowe
    CISO, National Association of Insurance Commissioners (NAIC)
  • speaker photo
    Britney Kennedy
    Global BISO & Director of Business Partnership, Cardinal Health

    Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since transitioned to Cardinal Health, initially leading Cyber Operations and now performing as the Director of Information Security Business Partnerships, providing Business Support, Security Awareness, and Compliance Operations across the Globe. Britney is a certified CISSP, CISM, PMP, SSAP. and holds certifications for CompTIA S+, CCSK, and IT Business Management. She holds a BS in Applied & Discrete Mathematics and an MS in Cybersecurity. Britney was also named an IT Security Power Player by SC Magazine and named as the Security Professional of the Year by ASIS Kansas City Chapter in 2020.

  • speaker photo
    Eric Walters
    CISO, Burns & McDonnell

    A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience includes healthcare cross-disciplinary compliance and privacy, software development, information security program management, cyber security managed services, federal government IT cloud deployments, global transition operations, and 20 years in the military.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.