- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, October 18, 20239:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO, Cyber Risk Opportunities LLCRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Colonnade RoomHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, October 19, 20237:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amImplementing Efficient Vendor Risk Management in the Cloud: A Balanced ApproachSTAR Program Director, Cloud Security AllianceRegistration Level:- Open Sessions
8:00 am - 8:50 amLocation / Room: AmbassadorIn the evolving digital era, efficient vendor risk management has emerged as a key component of a robust business strategy. With a growing reliance on third-party service providers, it becomes imperative for businesses to effectively evaluate and manage the associated risks to ensure business continuity and security. This presentation focuses on the broader aspects of vendor risk management and touches upon the use of supportive tools and process. Our discussion includes an overview of vendor risk management principles, techniques, and best practices, and how they are used as a part of this comprehensive strategy. In this presentation, we will explore various facets of vendor risk management, from risk identification and assessment to mitigation and monitoring. We will discuss how tools like the CSA Consensus Assessment Initiative Questioner (CAIQ) are contributing to these processes globally by offering a structured approach to evaluate potential cloud service vendors, ensuring no crucial security aspect is overlooked. Attendees will leave with a holistic understanding of vendor risk management, with insights on how to incorporate the proper tools into their current strategies, enhancing their overall approach to mitigate potential risks, and ensuring business resilience and sustainability.8:00 amWiCys Chapter MeetingThird Party Risk Management and AIInformation Security Engineer, World Wide TechnologyRegistration Level:- Open Sessions
8:00 am - 8:50 amLocation / Room: ConsulateOpen to all attendees.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)VP Segment & Technology Product Security, HumanaRegistration Level:- VIP / Exclusive
8:00 am - 8:50 amLocation / Room: Wine RoomThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] Cybersecurity Fusion: Uniting Forces for Modern Digital DefenseVP & CISO, QuickbaseAVP of IT & CISO, University of Health Sciences and Pharmacy in St. LouisCISO, Veterans United Home LoansAdjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State UniversityInstructor - Cybersecurity, Webster UniversityRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterHear from local cybersecurity executives in an electrifying panel discussion on how industry leaders collaborate across sectors, academia, and organizations to tackle evolving cyber threats. You’ll gain valuable insights on innovative strategies, emerging technologies, and interdisciplinary approaches to reinforce digital defenses and protect against cyber risks for your organization. Open Q&A following discussion.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amSOC Essentials: Assembling Your First Response TeamTeam Leader of Information Security, GarminRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: ConsulateThe Security Operations Center (SOC) is an organization’s first eyes and ears to security threats and risks. For the SOC to support being an organization’s first response team, the team must have the proper resources for continuous growth and monitoring to keep an organization secure. This discussion focuses on key foundational elements for developing and maturing a SOC. Attendees will learn how to establish processes, procedures, and growth plans for their SOC. Additionally, use metrics to show maturity opportunities within a SOC and identify cyber security risks in a business.
10:15 amThe Future of AI in SecuritySales CTO & Principal Systems Engineer, ExabeamRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: AmbassadorThere seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?
Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?
This discussion will explore:
- The history of AI, ML, and automation already in your security stack
- The dangers and challenges of unrestricted GPT and other chat bots as information sources
- Ways humans and AI can work together
10:15 amThreat Researcher's Guide to the Threat LandscapeDirector of Threat Research, Unit 42 Threat Intelligence, Palo Alto NetworksRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: PromenadeIn today’s hyper-connected world, the digital landscape is constantly evolving, presenting both opportunities and challenges. The Threat Researcher’s Guide to the ThreatLandscape delves into the dynamic realm of cybersecurity threats, providing a comprehensive overview of the latest developments, trends, and insights in the field of threat research. In this talk, Kyle will be exploring the evolving threat landscape and its impact on individuals, businesses and society as a whole. With cyberattacks becoming increasingly sophisticated and persistent, understanding the latest threat vectors and attack techniques is crucial for effective defense and mitigation strategies.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amMidwest Cryptocurrency Task Force: Bringing LE & the Private Sector TogetherDetective, St. Louis County Police Department, Intelligence Operations BureauRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: PromenadeHow a small problem that needed to be addressed locally led to the realization it was a problem everywhere. Working with all aspects of local, state, and federal law enforcement and leveraging private sector partners to combat illicit crimes involving cryptocurrency.
11:10 amDemystifying External Exposure ManagementChief Product Officer, CyCognitoRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: AmbassadorOrganizations are increasingly recognizing that unmanaged or under-managed, exposed assets represent the path of least resistance for attackers to execute successful attacks. Yet, the typical G2K organization is unaware of between one to two thirds of exposed assets. Moreover, these assets, which may include business critical web apps with PII data are rarely if ever tested for security vulnerabilities. The combination of unknown exposed assets and inadequate testing with the reality of siloed security programs is a perfect storm that creates a gaping hole that Gartner suggests organizations address as part of an External Exposure Management program. Join this session to learn more about the state of exposure management; it’s key challenges and effective solutions.
11:10 am[Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital OrchestraIdentifying the Current Threat LandscapeSolutions Engineer, OktaSr. Systems Engineer, IllumioVP, GTM Strategy, CyeraCloud Security Engineer - VP, CitiRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: AmphitheaterIn the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.
Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.
Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.
12:00 pm[Lunch Keynote] The Dark Side of AI: Unleashing the Power of HackGPT—Your Worst Nightmare Come to LifeHacker & Founder, SecKCRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterWelcome to the most cutting-edge, fear-inducing presentation on the dark side of AI. This presentation will take you on a heart-pumping journey into the world of hacking using the power of AI. Our presenter, a self-proclaimed hacker, will share his personal experiences and the latest advancements in ChatGPT technology that will leave you on the edge of your seat. Don’t miss out on this incredible opportunity to explore the dangerous world of AI-powered hacking. But beware: we only want attendees who are not afraid of the dark and who have a deep curiosity for the unknown.
Attendees will leave with a newfound understanding of the immense power and danger of AI in the world of hacking, and the dire need for heightened cybersecurity measures.
12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Adjunct Professor, Cybersecurity, Washington University in St. LouisRegistration Level:- VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: Wine RoomModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmSupporting Victims of Cybercrime: The Cyber HelplineDirector & Helpline Manager, The Cyber HelplineRegistration Level:- Conference Pass
1:15 pm - 2:15 pmLocation / Room: AmbassadorThe Cyber Helpline is a U.K. charity that supports over 2,000 victims of cybercrime every month by linking them with cybersecurity experts for free, professional help. The charity is delighted to be launching a pilot in the U.S. and to bring with them a wealth of expertise and knowledge to address a major gap and cybersecurity challenge in the States. Cybersecurity professionals are best placed to fill the gap in support for individuals experiencing cybercrime, but the impact, trends and the importance of giving safe advice means that it differs from “traditional” cybersecurity. Individuals facing cybercrime face unique challenges and require tailored support and expertise, which isn’t always available. This presentation provides an insight into the threats facing individuals in the online space, the impact it has on them, why the advice that you might give your friends and family could be inadvertently dangerous and how you can use your expertise and resources to make a difference in people’s lives with the skills you have, just by learning to apply them to a different audience. The session will allow for a Q&A to provide attendees with the chance to ask questions and understand more about this emerging career pathway and opportunities and responsibilities that their organizations have to support victims of cybercrime.1:15 pm[Panel] Navigating the Cybersecurity Symphony in the Age of AIUnderstanding and Theorizing the Future of Generative AIHead of Global Solutions Architects, Google Threat IntelligenceDirector, IT Software Engineering, DIRECTVAdjunct Professor, Cybersecurity, Washington University in St. LouisDirector, IT Security, Caleres, Inc.Registration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: AmphitheaterGenerative AI, such as ChatGPT and Bard, has incredible potential, but it also brings certain negative elements and concerns for everyone. It is important to address these concerns to ensure responsible and ethical use of AI technology, especially within cybersecurity. This panel covers insider threats, lack of accountability, cybersecurity vulnerabilities, fake data and data privacy, human replacement concerns, and ethical misuse.
By understanding these fears and proactively addressing them through responsible development, robust safeguards, and ongoing monitoring, we can harness the potential of generative AI while mitigating its associated risks. Collaboration between AI researchers, policymakers, and industry professionals is essential to ensure that generative AI technology is developed and deployed in a manner that aligns with ethical standards and human values. Hear from experts in the field on how they’re trying to navigate this new song and dance with AI, what we can expect in the near and distant future, and what it takes to provide the support DevOps teams need.
2:15 pmNetworking BreakRegistration Level:- Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:30 pm[Panel] Guardians of the Vault: Cybersecurity Strategies from Financial Sector TitansCISO & SVP, First BankDeputy CISO, FNBO BankSr. Director, BISO, EquifaxCISO, Equifax Workforce SolutionsRegistration Level:- Conference Pass
2:30 pm - 3:15 pmLocation / Room: AmphitheaterDelve into the realm of financial cybersecurity as industry leaders take the stage to share their cutting-edge strategies for threat intelligence and best practices employed to safeguard sensitive data, fortify defenses, and stay steps ahead of cyber threats in a modern world.2:30 pmAI and Cyber Ops: Optimization, Augmentation, and AssimilationPrincipal Solution Engineer, SentinelOneRegistration Level:- Open Sessions
2:30 pm - 3:15 pmLocation / Room: AmbassadorAI promises a lot of things, but what can we expect in the coming months? What practical results are we already seeing? What will be experienced by operations and what operational changes will we need to plan and staff for? Is there a timeline for optimum automation vs assimilation? More importantly, should you pack a toothbrush, a torx driver, or both? Talk will be liberally sprinkled with demos and speculations aplenty.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pmYour Career in CybersecurityAuthor, "Break In Cyber," vCISORegistration Level:- Open Sessions
3:45 pm - 4:30 pmLocation / Room: PromenadeWhether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you “level up” in your career. This sessions will cover:
- Best ways to achieve career growth
- Education (certifications or on-the-job experience?)
- Short-term career planning
- Long-term career planning
- Different paths in cybersecurity (Red Team, Blue Team, GRC, and more)
Even if you are satisfied in your current role, learn how to make yourself “recession proof.”
3:45 pmISC2 St. Louis Chapter Meeting - Open to all attendees10 Steps to Manage and Advance Your CareerSenior Controls Surveillance & Compliance Analyst, AmerenRegistration Level:- Open Sessions
3:45 pm - 4:30 pmLocation / Room: AmbassadorSession description coming soon.
3:45 pmInfraGard Chapter MeetingOpen to all attendeesGlobal CISO, Barry-WehmillerPresident, InfraGard Saint Louis Members AllianceRegistration Level:- Open Sessions
3:45 pm - 4:30 pmLocation / Room: ConsulateDiscussion topic and agenda TBD.
- Arista NetworksBooth: 330
Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.
- Armis, IncBooth: 220
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- Cloud Security Alliance St. Louis ChapterBooth: 350
- Critical StartBooth: 120
Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.
- CyCognitoBooth: 440
CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn’t even know existed. Welcome to the Shadow Risk Revolution.
- CyeraBooth: 240
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.
- DirSecBooth: 130
Dirsec is a value added reseller specializing in cyber security. Established in 2001 and headquartered in Broomfield, CO, we partner with over 30 different vendor technologies to tackle your I.T. security challenges and protect your business systems and data. We are proud to support clients from large enterprise to government and schools, with representatives who have the knowledge to support all your specialized business needs.
- ExabeamBooth: 300
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- IEEEBooth: 250
IEEE (Institute of Electrical and Electronics Engineers) is the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities. IEEE is the trusted “voice” for engineering, computing and technology information around the globe. There are more than 421,000 IEEE members in more than 160 countries. The IEEE publishes a third of the world’s technical literature in electrical engineering, computer science and electronics and is a leading developer of international standards that underpin many of today’s telecommunications, information technology and power generation products and services.
- IllumioBooth: 100
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. - InfraGardBooth: 150
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- ISACA St. LouisBooth: n/a
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Meetings are generally held the 3rd Wednesday of the month between September and May.
- ISC2 St. Louis ChapterBooth: 110
As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.
- Mandiant, now part of Google CloudBooth: 310
Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.
- OktaBooth: 410
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- One IdentityBooth: 340
One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.
- Palo Alto NetworksBooth: 400
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
- Recorded FutureBooth: 420
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- SentinelOneBooth: 200
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- Saint Louis University Workforce CenterBooth: 450
The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber Security, Project Management, Agile, Analytics, Software Engineering and more.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth: 320
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- VaronisBooth: 140
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
- WiCyS St. Louis Metropolitan AffiliateBooth: 430
- Cato NetworksBooth: 160
Cato Networks pioneered the convergence of networking and security into the cloud. Aligned with Gartner’s Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks, Cato’s vision is to deliver a next generation secure network architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Our cloud-native architecture enables Cato to rapidly deploy new capabilities and maintain optimum security posture, without any effort from the IT teams. With Cato, your IT organization and your business are ready for whatever comes next. For more information, visit https://www.catonetworks.com.
- WizBooth: 460
We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights that don’t waste time.
Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- John DiMariaSTAR Program Director, Cloud Security Alliance
John DiMaria has 30 years of successful experience in Standards and Management System Development, including Information Systems, Business Continuity, and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, and a working group member and key contributor to the NIST Cybersecurity Framework. He currently manages all facets of the CSA STAR Program which includes security, privacy, continuous monitoring, and development of new solutions.
- Tom HarringtonInformation Security Engineer, World Wide Technology
- James Norberg, ModeratorVP Segment & Technology Product Security, Humana
James Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Currently James and his family reside in the St. Louis area.
- Rebecca HarnessVP & CISO, Quickbase
Rebecca Harness is VP & Chief Information Security Officer for Quickbase. Rebecca has an established 25-year career in information technology with the past twelve years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of her career, and serves as President of ISACA St. Louis. Rebecca is an alumnus of Hastings College, holds several technology and security certifications, and recently received a Master of Science in Information Security Engineering (MSISE) from SANS Technology Institute.
- Zachary LewisAVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
Zach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving strategic growth. His leadership in negotiating vendor contracts, managing multi-million-dollar budgets, and chairing the Enterprise Risk Management Committee has resulted in substantial cost savings and operational efficiencies.
With a focus on aligning IT strategies with organizational goals, Zach has led successful cloud migrations, implemented robust cybersecurity measures, and established a culture of transparency and collaboration. His expertise extends to compliance with GLBA and FERPA regulations, managing cybersecurity training programs, and optimizing network infrastructure. Zach's passion for innovation, user-centric approach, and ability to build cross-functional teams have been instrumental in driving organizational success, enhancing cybersecurity defenses, and positioning the institution as a leader in health education and operational excellence.
Zach is a 2X recipient of Cyber Defense Magazine’s Top Global CISOs, was named 40 Under 40 Security Leaders by CDO Magazine, and was St. Louis Non-Profit CISO of the Year. He’s a recent graduate of the FBI CISO Academy. Zach provides his industry expertise to others by speaking at conferences, webinars, and universities throughout the country.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Renita RhodesAdjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University
Renita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguarding critical information security controls and conducting audits of paramount significance.
Renita's commitment to knowledge dissemination is evident through her roles as an Adjunct Instructor at Maryville University and Harris-Stowe State University. She imparts her knowledge through various courses, spanning Cyber Law, Policy, and Compliance, Security Information and Event Management, Introduction to Information Security, Applied Programming - Python, Cybersecurity Operations, and Systems Analysis and Design.
Her academic journey includes a Bachelor's degree in Business Information Systems from Tennessee State University, a Master's degree in Information Management from Washington University in St. Louis, and a Cybersecurity Certificate from Saint Louis University. During her graduate studies, she published a whitepaper titled "Developing Dynamic PeopleSoft Field Security Applications: A PeopleSoft Developer's Guide."
Beyond her professional and academic achievements, Renita is a passionate cybersecurity awareness and training advocate. She actively engages in various organizations such as the NIST NICE Cybersecurity Careers Ambassadors Program and CyberUp, where she is a Board Member and initiatives that promote diversity, equity, and inclusion in the cybersecurity sector. Renita has also participated as a conference panelist and podcast guest discussing cybersecurity and AI.
- Doug Menendez, ModeratorInstructor - Cybersecurity, Webster University
After retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).
Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniques using a variety of delivery modalities. Working to promote diversity, equity and inclusion in the cybersecurity space and committed to providing a powerful, transformative student experience. Passionately advancing the next generation of cybersecurity, IT audit and risk management professionals.
He is on the Board of Directors of CyberUp, A St. Louis-based nonprofit organization that focuses on cybersecurity apprenticeships and youth education programs. Doug is also on the Executive Committee of GHECC, the Gateway Higher Education Cybersecurity Consortium. He holds an MBA from Saint Louis University, and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).
- Reanna SchultzTeam Leader of Information Security, Garmin
Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.
- Bob RenySales CTO & Principal Systems Engineer, Exabeam
Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network access control and end point security architecture. Large program security include zero trust, Operational Architecture safety/security. His expertise has supported customer organizations public and private. This covers scaling for many large federal agencies, global 1000 companies in many business verticals across finance, utilities, service, and technology. Bob has been a CISSP for the past almost 22 years and continues to help organizations evaluate the broad security policy to streamline Security Operations Center activities. This includes improving cross-functional processes for change management, incident response, event escalation, and response.
- Kyle WilhoitDirector of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks
Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world-renowned threat researchers that identify, track and unearth technical intelligence related to actor groups present in hack tools, attack frameworks, targeted attack campaigns, and malware families.
- Michael ClintonDetective, St. Louis County Police Department, Intelligence Operations Bureau
- Ansh PatnaikChief Product Officer, CyCognito
Ansh Patnaik, Chief Product Officer, has over 20 years of cross functional experience in cybersecurity and data analytics. Most recently, Ansh was Director, Cloud Security Products for Google Cloud Platform, and Chief Product Officer for Chronicle, prior to the acquisition of Chronicle by Google. Previously, he was VP of Product Management at Oracle Cloud where he defined and launched their security analytics cloud service offering. Ansh has held product management, product marketing and sales engineering leadership roles at several market leading software companies including Delphix, ArcSight (acquired by HP), and BindView (acquired by Symantec).
- Armando AguilarSolutions Engineer, Okta
Armando is a Solutions Engineer whose expertise lies in developing comprehensive strategies that enable organizations to manage identity and access privileges efficiently while mitigating security risks around the Okta Identity Cloud. Armando has a deep understanding of industry best practices and a proven track record of successful implementations. He is a trusted advisor to businesses of all sizes looking to improve their security posture. Armando is known for his collaborative, innovative, and dedicated approach to delivering solutions that help organizations achieve their security and business objectives.
- Ariel WeilVP, GTM Strategy, Cyera
With more than 20 years of cross-functional knowledge and experience focusing on data security, compliance, risk management, cloud adoption, digital transformation, and modern application architectures, Ariel (Ari) Weil leads Cyera’s go-to-market (GTM) efforts as the Vice President of GTM Strategy. As a hands-on executive, Ari brings his knowledge and expertise across multiple operational disciplines to Cyera’s customers as they navigate the evolving landscape of data risk and governance.
- Damien Burks, ModeratorCloud Security Engineer - VP, Citi
- Corian KennedyHacker & Founder, SecKC
Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay one step ahead of cybercriminals. With a current role in advanced research and hacking for one of the most prominent cybersecurity firms in the world, Corian has helped shape the industry's future and continues to push the limits of what is possible in the field of cybersecurity.
- Andrew Wilder, ModeratorAdjunct Professor, Cybersecurity, Washington University in St. Louis
Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.
- Charlotte HooperDirector & Helpline Manager, The Cyber Helpline
Charlotte is the Helpline Manager at The Cyber Helpline and has supported thousands of victims of cybercrime and online harm, specializing in cyberstalking and technology-facilitated intimate partner violence. On top of her role at The Cyber Helpline, Charlotte has a first-class degree in Policing and Criminal Justice and a masters degree in Cybercrime Investigation. Charlotte delivers cybercrime related training sessions around the world for police forces, victim support charities and private organizations. Her areas of expertise include: Cybercrime investigations, cybercrime law enforcement & regulation, open-source intelligence, cyberstalking & online harassment, the cybercrime & online harm threat landscape and the impact of cybercrime on victims.
For more, read our interview with Charlotte here: https://www.secureworld.io/industry-news/what-is-the-cyber-helpline
- Tim GalloHead of Global Solutions Architects, Google Threat Intelligence
Tim Gallo is the Head of Global Solutions Architects at Google, he specializes in Cyber Threat Intelligence and Risk everything from Intelligence Operations and Cyber Threat Profile development to risk based analytic approaches to Security Operations. He Joined Google Cloud through the acquisition of Mandiant by Google in 2022, he had spent 5 years at Mandiant prior to the acquisition in a variety of field facing roles covering the aforementioned topics. Before joining Mandiant, Tim leveraged his over 20 years’ experience in information security and intelligence operations to aid in the development and deployment of a number of solutions. Including building client and organizational expertise in Intelligence Led Security and Business Operations. This included the development and product management of some of the first cyber intelligence solutions ever brought to market. These solutions have included threat and vulnerability management tools, IOC prediction algorithms, intelligence services, and strategic intelligence consulting. Today he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective security processes and operations and helping clients and vendors find ways to leverage technologies responsibly to build their cyber defense centers and security operations practices. Every once in a while he can be found out in the desert, sometimes on his Harley with a flamethrower, sometimes with just a flamethrower
- Tina LampeDirector, IT Software Engineering, DIRECTV
Tina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity – Leadership focus from Maryville University in St. Louis, Missouri. Tina is a specialized advocate of Business and Technology Strategies including Artificial Intelligence and other emerging technologies. Tina has demonstrated experience leading global teams to successful completion of complex technical software and infrastructure initiatives.
- Andrew WilderAdjunct Professor, Cybersecurity, Washington University in St. Louis
Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.
- Tami Spellman, ModeratorDirector, IT Security, Caleres, Inc.
Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.
- Marc AshworthCISO & SVP, First Bank
Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.
- Sara FloresDeputy CISO, FNBO Bank
- Michelle SickbertSr. Director, BISO, Equifax
Michelle is the Business Information Security Officer.
- Ryan Frillman, ModeratorCISO, Equifax Workforce Solutions
- Shane HarschPrincipal Solution Engineer, SentinelOne
Shane Harsch is a Principal Solution Engineer at SentinelOne, a SANS Instructor, and an Adjunct Instructor at the University of Michigan with more than 25 years of experience in military, manufacturing, consulting, and professional services. He is a commissioned officer in the U.S. Army (MI), holds degrees in business (MBA) and computational linguistics (BA), and maintains the following certifications: GCIA, GCIH, GCED, CISSP, CTIA.
- Mike MillerAuthor, "Break In Cyber," vCISO
Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For more than 25 years, Mike has specialized in both offensive and defensive cybersecurity and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.
- Craig Reeds, ModeratorSenior Controls Surveillance & Compliance Analyst, Ameren
Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Compliance Senior Consultant he helps to protect the North American Power Grid. Craig hold both a CISSP and the CRISC certifications as well as degrees a BS in Information Systems from Maryville and an MBA from Webster University.
- Roftiel Constantine, HostGlobal CISO, Barry-Wehmiller
Roftiel also serves as Vice President of the InfraGard Saint Louis Members Alliance.
- David Wren, HostPresident, InfraGard Saint Louis Members Alliance
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes