Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 18, 2023
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Colonnade Room

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, October 19, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Implementing Efficient Vendor Risk Management in the Cloud: A Balanced Approach
    • session level icon
    speaker photo
    STAR Program Director, Cloud Security Alliance
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: Ambassador
    In the evolving digital era, efficient vendor risk management has emerged as a key component of a robust business strategy. With a growing reliance on third-party service providers, it becomes imperative for businesses to effectively evaluate and manage the associated risks to ensure business continuity and security. This presentation focuses on the broader aspects of vendor risk management and touches upon the use of supportive tools and process. Our discussion includes an overview of vendor risk management principles, techniques, and best practices, and how they are used as a part of this comprehensive strategy. In this presentation, we will explore various facets of vendor risk management, from risk identification and assessment to mitigation and monitoring. We will discuss how tools like the CSA Consensus Assessment Initiative Questioner (CAIQ) are contributing to these processes globally by offering a structured approach to evaluate potential cloud service vendors, ensuring no crucial security aspect is overlooked. Attendees will leave with a holistic understanding of vendor risk management, with insights on how to incorporate the proper tools into their current strategies, enhancing their overall approach to mitigate potential risks, and ensuring business resilience and sustainability.
    8:00 am
    WiCys Chapter Meeting
    • session level icon
    Third Party Risk Management and AI
    speaker photo
    Information Security Engineer, World Wide Technology
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: Consulate

    Open to all attendees.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    speaker photo
    VP Segment & Technology Product Security, Humana
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: Wine Room

    This roundtable discussion is for our Advisory Council members only.

    9:00 am
    [Opening Keynote] Cybersecurity Fusion: Uniting Forces for Modern Digital Defense
    • session level icon
    speaker photo
    VP & CISO, Quickbase
    speaker photo
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
    speaker photo
    CISO, Veterans United Home Loans
    speaker photo
    Adjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University
    speaker photo
    Instructor - Cybersecurity, Webster University
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Hear from local cybersecurity executives in an electrifying panel discussion on how industry leaders collaborate across sectors, academia, and organizations to tackle evolving cyber threats. You’ll gain valuable insights on innovative strategies, emerging technologies, and interdisciplinary approaches to reinforce digital defenses and protect against cyber risks for your organization. Open Q&A following discussion.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    SOC Essentials: Assembling Your First Response Team
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Consulate

    The Security Operations Center (SOC) is an organization’s first eyes and ears to security threats and risks. For the SOC to support being an organization’s first response team, the team must have the proper resources for continuous growth and monitoring to keep an organization secure. This discussion focuses on key foundational elements for developing and maturing a SOC. Attendees will learn how to establish processes, procedures, and growth plans for their SOC. Additionally, use metrics to show maturity opportunities within a SOC and identify cyber security risks in a business.

    10:15 am
    The Future of AI in Security
    • session level icon
    speaker photo
    Sales CTO & Principal Systems Engineer, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Ambassador

    There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?

    Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?

    This discussion will explore:

    • The history of AI, ML, and automation already in your security stack
    • The dangers and challenges of unrestricted GPT and other chat bots as information sources
    • Ways humans and AI can work together
    10:15 am
    Threat Researcher's Guide to the Threat Landscape
    • session level icon
    speaker photo
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Promenade

    In today’s hyper-connected world, the digital landscape is constantly evolving, presenting both opportunities and challenges. The Threat Researcher’s Guide to the ThreatLandscape delves into the dynamic realm of cybersecurity threats, providing a comprehensive overview of the latest developments, trends, and insights in the field of threat research. In this talk, Kyle will be exploring the evolving threat landscape and its impact on individuals, businesses and society as a whole. With cyberattacks becoming increasingly sophisticated and persistent, understanding the latest threat vectors and attack techniques is crucial for effective defense and mitigation strategies.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Midwest Cryptocurrency Task Force: Bringing LE & the Private Sector Together
    • session level icon
    speaker photo
    Detective, St. Louis County Police Department, Intelligence Operations Bureau
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Promenade

    How a small problem that needed to be addressed locally led to the realization it was a problem everywhere. Working with all aspects of local, state, and federal law enforcement and leveraging private sector partners to combat illicit crimes involving cryptocurrency.

    11:10 am
    Demystifying External Exposure Management
    • session level icon
    speaker photo
    Chief Product Officer, CyCognito
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Ambassador

    Organizations are increasingly recognizing that unmanaged or under-managed, exposed assets represent the path of least resistance for attackers to execute successful attacks. Yet, the typical G2K organization is unaware of between one to two thirds of exposed assets. Moreover, these assets, which may include business critical web apps with PII data are rarely if ever tested for security vulnerabilities. The combination of unknown exposed assets and inadequate testing with the reality of siloed security programs is a perfect storm that creates a gaping hole that Gartner suggests organizations address as part of an External Exposure Management program. Join this session to learn more about the state of exposure management; it’s key challenges and effective solutions.

    11:10 am
    [Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital Orchestra
    • session level icon
    Identifying the Current Threat Landscape
    speaker photo
    Solutions Engineer, Okta
    speaker photo
    Sr. Systems Engineer, Illumio
    speaker photo
    VP, GTM Strategy, Cyera
    speaker photo
    Cloud Security Engineer - VP, Citi
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Amphitheater

    In the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.

    Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.

    Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.

    12:00 pm
    [Lunch Keynote] The Dark Side of AI: Unleashing the Power of HackGPT—Your Worst Nightmare Come to Life
    • session level icon
    speaker photo
    Hacker & Founder, SecKC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Welcome to the most cutting-edge, fear-inducing presentation on the dark side of AI. This presentation will take you on a heart-pumping journey into the world of hacking using the power of AI. Our presenter, a self-proclaimed hacker, will share his personal experiences and the latest advancements in ChatGPT technology that will leave you on the edge of your seat. Don’t miss out on this incredible opportunity to explore the dangerous world of AI-powered hacking. But beware: we only want attendees who are not afraid of the dark and who have a deep curiosity for the unknown.

    Attendees will leave with a newfound understanding of the immense power and danger of AI in the world of hacking, and the dire need for heightened cybersecurity measures.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    speaker photo
    Adjunct Professor, Cybersecurity, Washington University in St. Louis
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Wine Room

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Supporting Victims of Cybercrime: The Cyber Helpline
    • session level icon
    speaker photo
    Director & Helpline Manager, The Cyber Helpline
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: Ambassador
    The Cyber Helpline is a U.K. charity that supports over 2,000 victims of cybercrime every month by linking them with cybersecurity experts for free, professional help. The charity is delighted to be launching a pilot in the U.S. and to bring with them a wealth of expertise and knowledge to address a major gap and cybersecurity challenge in the States. Cybersecurity professionals are best placed to fill the gap in support for individuals experiencing cybercrime, but the impact, trends and the importance of giving safe advice means that it differs from “traditional” cybersecurity. Individuals facing cybercrime face unique challenges and require tailored support and expertise, which isn’t always available. This presentation provides an insight into the threats facing individuals in the online space, the impact it has on them, why the advice that you might give your friends and family could be inadvertently dangerous and how you can use your expertise and resources to make a difference in people’s lives with the skills you have, just by learning to apply them to a different audience. The session will allow for a Q&A to provide attendees with the chance to ask questions and understand more about this emerging career pathway and opportunities and responsibilities that their organizations have to support victims of cybercrime.
    1:15 pm
    [Panel] Navigating the Cybersecurity Symphony in the Age of AI
    • session level icon
    Understanding and Theorizing the Future of Generative AI
    speaker photo
    Mandiant Principal Architect, Google Cloud
    speaker photo
    Director, IT Software Engineering, DIRECTV
    speaker photo
    Adjunct Professor, Cybersecurity, Washington University in St. Louis
    speaker photo
    Director, IT Security, Caleres, Inc.
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Amphitheater

    Generative AI, such as ChatGPT and Bard, has incredible potential, but it also brings certain negative elements and concerns for everyone. It is important to address these concerns to ensure responsible and ethical use of AI technology, especially within cybersecurity. This panel covers insider threats, lack of accountability, cybersecurity vulnerabilities, fake data and data privacy, human replacement concerns, and ethical misuse.

    By understanding these fears and proactively addressing them through responsible development, robust safeguards, and ongoing monitoring, we can harness the potential of generative AI while mitigating its associated risks. Collaboration between AI researchers, policymakers, and industry professionals is essential to ensure that generative AI technology is developed and deployed in a manner that aligns with ethical standards and human values. Hear from experts in the field on how they’re trying to navigate this new song and dance with AI, what we can expect in the near and distant future, and what it takes to provide the support DevOps teams need.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:30 pm
    [Panel] Guardians of the Vault: Cybersecurity Strategies from Financial Sector Titans
    • session level icon
    speaker photo
    CISO & SVP, First Bank
    speaker photo
    Deputy CISO, FNBO Bank
    speaker photo
    Sr. Director, BISO, Equifax
    speaker photo
    CISO, Equifax Workforce Solutions
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: Amphitheater
    Delve into the realm of financial cybersecurity as industry leaders take the stage to share their cutting-edge strategies for threat intelligence and best practices employed to safeguard sensitive data, fortify defenses, and stay steps ahead of cyber threats in a modern world.
    2:30 pm
    AI and Cyber Ops: Optimization, Augmentation, and Assimilation
    • session level icon
    speaker photo
    Senior Solution Engineer, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Ambassador

    AI promises a lot of things, but what can we expect in the coming months? What practical results are we already seeing? What will be experienced by operations and what operational changes will we need to plan and staff for? Is there a timeline for optimum automation vs assimilation? More importantly, should you pack a toothbrush, a torx driver, or both? Talk will be liberally sprinkled with demos and speculations aplenty.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    Your Career in Cybersecurity
    • session level icon
    speaker photo
    Author, "Break In Cyber," vCISO
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Promenade

    Whether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you “level up” in your career. This sessions will cover:

    • Best ways to achieve career growth
    • Education (certifications or on-the-job experience?)
    • Short-term career planning
    • Long-term career planning
    • Different paths in cybersecurity (Red Team, Blue Team, GRC, and more)

    Even if you are satisfied in your current role, learn how to make yourself “recession proof.”

    3:45 pm
    ISC2 St. Louis Chapter Meeting - Open to all attendees
    • session level icon
    10 Steps to Manage and Advance Your Career
    speaker photo
    Senior Controls Surveillance & Compliance Analyst, Ameren
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Ambassador

    Session description coming soon.

    3:45 pm
    InfraGard Chapter Meeting
    • session level icon
    Open to all attendees
    speaker photo
    Global CISO, Barry-Wehmiller
    speaker photo
    President, InfraGard Saint Louis Members Alliance
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Consulate

    Discussion topic and agenda TBD.

Exhibitors
  • Arista Networks
    Booth: 330

    Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.

  • Armis, Inc
    Booth: 220

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Cloud Security Alliance St. Louis Chapter
    Booth: 350
  • Critical Start
    Booth: 120

    Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.

  • CyCognito
    Booth: 440

    CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn’t even know existed. Welcome to the Shadow Risk Revolution.

  • Cyera
    Booth: 240

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • DirSec
    Booth: 130

    Dirsec is a value added reseller specializing in cyber security. Established in 2001 and headquartered in Broomfield, CO, we partner with over 30 different vendor technologies to tackle your I.T. security challenges and protect your business systems and data. We are proud to support clients from large enterprise to government and schools, with representatives who have the knowledge to support all your specialized business needs.

  • Exabeam
    Booth: 300

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • IEEE
    Booth: 250

    IEEE (Institute of Electrical and Electronics Engineers) is the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities. IEEE is the trusted “voice” for engineering, computing and technology information around the globe. There are more than 421,000 IEEE members in more than 160 countries. The IEEE publishes a third of the world’s technical literature in electrical engineering, computer science and electronics and is a leading developer of international standards that underpin many of today’s telecommunications, information technology and power generation products and services.

  • Illumio
    Booth: 100

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InfraGard
    Booth: 150

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA St. Louis
    Booth: n/a

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

    Meetings are generally held the 3rd Wednesday of the month between September and May.

  • ISC2 St. Louis Chapter
    Booth: 110

    As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.

  • Mandiant, now part of Google Cloud
    Booth: 310

    Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

  • Okta
    Booth: 410

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • One Identity
    Booth: 340

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

  • Palo Alto Networks
    Booth: 400

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Recorded Future
    Booth: 420

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • SentinelOne
    Booth: 200

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • Saint Louis University Workforce Center
    Booth: 450

    The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber SecurityProject ManagementAgileAnalyticsSoftware Engineering and more.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: 320

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Varonis Systems, Inc.
    Booth: 140

    Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

  • WiCyS St. Louis Metropolitan Affiliate
    Booth: 430
  • Cato Networks
    Booth: 160

    Cato Networks pioneered the convergence of networking and security into the cloud. Aligned with Gartner’s Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks, Cato’s vision is to deliver a next generation secure network architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Our cloud-native architecture enables Cato to rapidly deploy new capabilities and maintain optimum security posture, without any effort from the IT teams. With Cato, your IT organization and your business are ready for whatever comes next. For more information, visit https://www.catonetworks.com.

  • Wiz
    Booth: 460

    We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights  that don’t waste time.

    Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    John DiMaria
    STAR Program Director, Cloud Security Alliance

    John DiMaria has 30 years of successful experience in Standards and Management System Development, including Information Systems, Business Continuity, and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, and a working group member and key contributor to the NIST Cybersecurity Framework. He currently manages all facets of the CSA STAR Program which includes security, privacy, continuous monitoring, and development of new solutions.

  • speaker photo
    Tom Harrington
    Information Security Engineer, World Wide Technology
  • speaker photo
    James Norberg, Moderator
    VP Segment & Technology Product Security, Humana

    James Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Currently James and his family reside in the St. Louis area.

  • speaker photo
    Rebecca Harness
    VP & CISO, Quickbase

    Rebecca Harness is VP & Chief Information Security Officer for Quickbase. Rebecca has an established 25-year career in information technology with the past twelve years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of her career, and serves as President of ISACA St. Louis. Rebecca is an alumnus of Hastings College, holds several technology and security certifications, and recently received a Master of Science in Information Security Engineering (MSISE) from SANS Technology Institute.

  • speaker photo
    Zachary Lewis
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis

    Zach Lewis serves as the CIO and CISO for the University of Health Sciences and Pharmacy. He handles IT Strategic Planning, Cyber and Physical Security, Enterprise Risk Management, Infrastructure Management, IT Governance and Compliance, and day-to-day technology leadership. He volunteers on IT advisory boards for SIUE and UMSL and is an officer in the St. Louis Chapter of InfraGard.

    Zach holds a CISSP, CRISC, CISM, CISA, and CGEIT, as well as numerous other IT certifications. He was a recipient of Cyber Defense Magazine’s Top Global CISOs of 2022. Zach provides his industry expertise by speaking at conferences, webinars, and schools throughout the country.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Renita Rhodes
    Adjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University

    Renita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguarding critical information security controls and conducting audits of paramount significance.

    Renita's commitment to knowledge dissemination is evident through her roles as an Adjunct Instructor at Maryville University and Harris-Stowe State University. She imparts her knowledge through various courses, spanning Cyber Law, Policy, and Compliance, Security Information and Event Management, Introduction to Information Security, Applied Programming - Python, Cybersecurity Operations, and Systems Analysis and Design.

    Her academic journey includes a Bachelor's degree in Business Information Systems from Tennessee State University, a Master's degree in Information Management from Washington University in St. Louis, and a Cybersecurity Certificate from Saint Louis University. During her graduate studies, she published a whitepaper titled "Developing Dynamic PeopleSoft Field Security Applications: A PeopleSoft Developer's Guide."

    Beyond her professional and academic achievements, Renita is a passionate cybersecurity awareness and training advocate. She actively engages in various organizations such as the NIST NICE Cybersecurity Careers Ambassadors Program and CyberUp, where she is a Board Member and initiatives that promote diversity, equity, and inclusion in the cybersecurity sector. Renita has also participated as a conference panelist and podcast guest discussing cybersecurity and AI.

  • speaker photo
    Doug Menendez, Moderator
    Instructor - Cybersecurity, Webster University

    After retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).

    Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniques using a variety of delivery modalities. Working to promote diversity, equity and inclusion in the cybersecurity space and committed to providing a powerful, transformative student experience. Passionately advancing the next generation of cybersecurity, IT audit and risk management professionals.

    He is on the Board of Directors of CyberUp, A St. Louis-based nonprofit organization that focuses on cybersecurity apprenticeships and youth education programs. Doug is also on the Executive Committee of GHECC, the Gateway Higher Education Cybersecurity Consortium. He holds an MBA from Saint Louis University, and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Bob Reny
    Sales CTO & Principal Systems Engineer, Exabeam

    Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network access control and end point security architecture. Large program security include zero trust, Operational Architecture safety/security. His expertise has supported customer organizations public and private. This covers scaling for many large federal agencies, global 1000 companies in many business verticals across finance, utilities, service, and technology. Bob has been a CISSP for the past almost 22 years and continues to help organizations evaluate the broad security policy to streamline Security Operations Center activities. This includes improving cross-functional processes for change management, incident response, event escalation, and response.

  • speaker photo
    Kyle Wilhoit
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks

    Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world-renowned threat researchers that identify, track and unearth technical intelligence related to actor groups present in hack tools, attack frameworks, targeted attack campaigns, and malware families.

  • speaker photo
    Michael Clinton
    Detective, St. Louis County Police Department, Intelligence Operations Bureau
  • speaker photo
    Ansh Patnaik
    Chief Product Officer, CyCognito

    Ansh Patnaik, Chief Product Officer, has over 20 years of cross functional experience in cybersecurity and data analytics. Most recently, Ansh was Director, Cloud Security Products for Google Cloud Platform, and Chief Product Officer for Chronicle, prior to the acquisition of Chronicle by Google. Previously, he was VP of Product Management at Oracle Cloud where he defined and launched their security analytics cloud service offering. Ansh has held product management, product marketing and sales engineering leadership roles at several market leading software companies including Delphix, ArcSight (acquired by HP), and BindView (acquired by Symantec).

  • speaker photo
    Armando Aguilar
    Solutions Engineer, Okta

    Armando is a Solutions Engineer whose expertise lies in developing comprehensive strategies that enable organizations to manage identity and access privileges efficiently while mitigating security risks around the Okta Identity Cloud. Armando has a deep understanding of industry best practices and a proven track record of successful implementations. He is a trusted advisor to businesses of all sizes looking to improve their security posture. Armando is known for his collaborative, innovative, and dedicated approach to delivering solutions that help organizations achieve their security and business objectives.

  • speaker photo
    Mitch Morice
    Sr. Systems Engineer, Illumio
  • speaker photo
    Ariel Weil
    VP, GTM Strategy, Cyera

    With more than 20 years of cross-functional knowledge and experience focusing on data security, compliance, risk management, cloud adoption, digital transformation, and modern application architectures, Ariel (Ari) Weil leads Cyera’s go-to-market (GTM) efforts as the Vice President of GTM Strategy. As a hands-on executive, Ari brings his knowledge and expertise across multiple operational disciplines to Cyera’s customers as they navigate the evolving landscape of data risk and governance.

  • speaker photo
    Damien Burks, Moderator
    Cloud Security Engineer - VP, Citi
  • speaker photo
    Corian Kennedy
    Hacker & Founder, SecKC

    Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay one step ahead of cybercriminals. With a current role in advanced research and hacking for one of the most prominent cybersecurity firms in the world, Corian has helped shape the industry's future and continues to push the limits of what is possible in the field of cybersecurity.

  • speaker photo
    Andrew Wilder, Moderator
    Adjunct Professor, Cybersecurity, Washington University in St. Louis

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.

  • speaker photo
    Charlotte Hooper
    Director & Helpline Manager, The Cyber Helpline

    Charlotte is the Helpline Manager at The Cyber Helpline and has supported thousands of victims of cybercrime and online harm, specializing in cyberstalking and technology-facilitated intimate partner violence. On top of her role at The Cyber Helpline, Charlotte has a first-class degree in Policing and Criminal Justice and a masters degree in Cybercrime Investigation. Charlotte delivers cybercrime related training sessions around the world for police forces, victim support charities and private organizations. Her areas of expertise include: Cybercrime investigations, cybercrime law enforcement & regulation, open-source intelligence, cyberstalking & online harassment, the cybercrime & online harm threat landscape and the impact of cybercrime on victims.

    For more, read our interview with Charlotte here: https://www.secureworld.io/industry-news/what-is-the-cyber-helpline

  • speaker photo
    Tim Gallo
    Mandiant Principal Architect, Google Cloud

    Tim Gallo leads the Google Global Solutions Architecture Team that covers Security Risk Solutions, including Cyber Threat Intelligence, traditional Intelligence Operations, Managed Detection and Response, Security Controls Validation, and Attack Surface Management and asset discovery. He Joined Google Cloud through the acquisition of Mandiant by Google in 2022, he had spent 5 years at Mandiant prior to the acquisition in a variety of field facing roles covering the aforementioned topics. Before joining Mandiant, Tim leveraged his over 20 years’ experience in information security and intelligence operations to aid in the development and deployment of a number of solutions. Including building client and organizational expertise in Intelligence Guided Cyber Network Defense (IGCND). This included the development and product management of some of the first cyber intelligence solutions ever brought to market. These solutions have included threat and vulnerability management tools, IOC prediction algorithms, intelligence services, and strategic intelligence consulting. Today he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective security processes and operations and helping clients and vendors find ways to leverage technologies responsibly to build their cyber defense centers and security operations practices. Every once in a while he can be found out in the desert, sometimes on his Harley with a flamethrower, sometimes with just a flamethrower.

  • speaker photo
    Tina Lampe
    Director, IT Software Engineering, DIRECTV

    Tina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program/Project/Product Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity – Leadership focus from Maryville University in St. Louis, Missouri. Tina is a specialized advocate of Business and Technology Strategies with the ability to provide guidance on balancing cybersecurity risks while enabling business digital transformation. Tina has demonstrated experience leading global teams to successful completion of complex technical software and infrastructure initiatives. Tina also has a proven ability to repair business relationships and to establish rapport with diverse groups, organizational levels and backgrounds.

  • speaker photo
    Andrew Wilder
    Adjunct Professor, Cybersecurity, Washington University in St. Louis

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.

  • speaker photo
    Tami Spellman, Moderator
    Director, IT Security, Caleres, Inc.

    Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.

  • speaker photo
    Marc Ashworth
    CISO & SVP, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.

  • speaker photo
    Sara Flores
    Deputy CISO, FNBO Bank
  • speaker photo
    Michelle Sickbert
    Sr. Director, BISO, Equifax

    Michelle is the Business Information Security Officer.

  • speaker photo
    Ryan Frillman, Moderator
    CISO, Equifax Workforce Solutions
  • speaker photo
    Shane Harsch
    Senior Solution Engineer, SentinelOne

    Shane Harsch is an Information Security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers and is a commissioned officer in the US Army, Military Intelligence. Shane holds degrees in business (MBA) and computational linguistics (BA), and maintains the following certifications: Intrusion Analyst (GCIA), Incident Handling (GCIH), Enterprise Defense (GCED), Information Security (CISSP), and Threat Intelligence Analyst (CTIA). In addition to his responsibilities as a Senior Solution Engineer at SentinelOne, Shane fosters new professionals to information security as a SANS Instructor and an Adjunt Instructor for the University of Michigan.

  • speaker photo
    Mike Miller
    Author, "Break In Cyber," vCISO

    Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For more than 25 years, Mike has specialized in both offensive and defensive cybersecurity and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.

  • speaker photo
    Craig Reeds, Moderator
    Senior Controls Surveillance & Compliance Analyst, Ameren

    Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Compliance Senior Consultant he helps to protect the North American Power Grid. Craig hold both a CISSP and the CRISC certifications as well as degrees a BS in Information Systems from Maryville and an MBA from Webster University.

  • speaker photo
    Roftiel Constantine, Host
    Global CISO, Barry-Wehmiller

    Roftiel also serves as Vice President of the InfraGard Saint Louis Members Alliance.

  • speaker photo
    David Wren, Host
    President, InfraGard Saint Louis Members Alliance
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes