- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, September 25, 20249:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: AmbassadorHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, September 26, 20247:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Breakfast Roundtable (VIP / Invite Only)CISOs Under FireGlobal Cybersecurity Senior Manager, MarsRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amLocation / Room: The Wine RoomIn an era where cyber threats are escalating and the legal landscape is becoming increasingly complex, Chief Information Security Officers (CISOs) find themselves at the frontline of their organization’s defense. This closed-door discussion aims to address critical questions such as:
- What are you doing to protect your company and yourself from some of the risks and legal liabilities?
- Do you have Board insurance?
- Do you have personal insurance?
- Has this changed how you interact with other leaders and the board?
This roundtable discussion is for our Advisory Council members only.
8:00 amAre You in a Dysfunctional Relationship with the HR Department?Executive Director, National Cybersecurity AllianceRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: ConsulateWhen HR and security teams understand their respective roles, value each other, and have an open, productive partnership, life is good. They can help each other be more effective and complement each other’s functions. Unfortunately, that symbiotic state can be hard to achieve. For security teams, HR folks can be hard to understand. Sometimes they seem like a great advocate for security, and at other times they can seem more like a blocker of our efforts to better secure the organization.
For HR professionals, dealing with the security team can be a challenge. For example, the security team might send out an emotionally-triggering simulated phish to everyone in the organization, causing numerous employee complaints that HR has to manage. So what can you do if you don’t have the best relationship with the HR team?
This talk, based on years of experience navigating the relationship between HR and security teams, will cover the issues that cause the biggest disconnects between HR and security. We’ll look at the issues from both sides and cover proposed solutions for each. Improving the relationships for both departments can lead to happier HR and security professionals who are more effective in their roles, and a company that’s better protected and prepared against cyber threats.
8:00 amWiCys Chapter Meeting - Cybersecurity Awareness Month: Engagement StrategiesOpen to all attendeesCyber Talent Director, Mastercard; Secretary & Founder, WiCyS St. Louis MetroRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: Ambassador Room8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Securing the Vote: Challenges and Innovations in Election SecurityDirector of Elections, Saint Louis County Election BoardCybersecurity Advisor and Coordinator for Missouri, DHS CISADirector of Elections, State of MissouriAVP of IT & CISO, University of Health Sciences and Pharmacy in St. LouisRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIn an era where digital threats loom large, ensuring the integrity and security of elections is paramount. This panel brings together leading experts in cybersecurity, election administration, and policy to discuss the multifaceted challenges of protecting our democratic processes. From cyberattacks and misinformation campaigns to safeguarding voter data and ensuring transparency, our panelists will explore the latest innovations and strategies in election security. Attendees will gain insights into the evolving threat landscape, the role of technology in securing elections, and collaborative approaches to building resilient electoral systems. Join us for a critical conversation on preserving the cornerstone of democracy in the digital age.9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amImplementing a Secure IT & OT Security Footprint and Network VisibilityGlobal Sr. Manager, Information Security, OlinRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: ConsulateNIST + CIS controls is an excellent security model your company can use to ensure it considers the appropriate security strategies and implements the necessary toolsets to achieve a highly secured IT and OT security footprint. Come join this discussion to learn how to implement this model, what the strategy, map, and approach look like to achieve this level of control and compliance, learn why IT and OT (Business and Operational/Production networks) security are critical, understand why network visibility is essential, and considerations in choosing the appropriate network visibility platform.
10:15 amWhat to Do When SaaS Security FailsDeputy CISO, CenteneRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: AmphitheaterSession description coming soon.
10:15 amThe Future of Cybersecurity Is AutonomousSr. Manager, Data Solutions Engineering, SentinelOneRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: AmbassadorSecurity professionals face ever-increasing challenges. From the changing landscape of attacks to defensive tools and workforce shortages, cybersecurity has already begun a drastic transformation. We examine how AI and automation streamline processes and tasks at scale to defeat next-generation attack vectors and uplevel security operations, services and business models.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amSocial Engineering: Training the Human FirewallTeam Leader of Information Security, GarminRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: ConsulatePhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
11:10 amLeveraging Generative AI to Automate Source Code InspectionPrincipal Product Security Architect, BayerRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: AmbassadorWhile recent advancements in large language models (LLMs) have paved the way for options that are more adept at analyzing source code and providing tailored remediation advice, the current options available to security professionals and software engineers involve time consuming techniques and risk missing areas of code. Additionally, an organization’s legacy applications may not be slated for manual review any time soon.This talk presents a new approach that automates the process, performs holistic inspection, and greatly increases the speed of producing findings for red teams, blue teams, and security engineers.11:10 am[Panel] Unveiling the Threat Landscape and Unmasking Digital VillainsVice President, SavvySolutions Architect, Aqua SecurityCISO in Residence, ZscalerDirector of Information Security, Shelter InsuranceRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: AmphitheaterIn the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.
Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.
Our panel provides a comprehensive overview of the current threat landscape.
12:00 pm[Lunch Keynote] Your Success Is in YOU!Speaker, Author & Career Strategist, CAREERCompass, LLCRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterToday, studies show an increasing number of professionals feel bored, burned out, or frustrated when it comes to their career. Whether they struggle with uncertainty regarding their career direction, lack the knowledge needed to successfully navigate their work environment, or the loss of empowerment to make the best career choices for themselves, many want answers to improve their future, but aren’t sure of how to get them.
In this talk, Bernie Frazier, SPHR, shares insights regarding principles often overlooked and unaddressed by professionals which prevent many of them from experiencing the career success and fulfillment they desire. By
understanding and adopting these powerful principles, these same professionals can begin to see a transformation in their career which can result in a lasting, positive impact on their organization’s and their own success!12:00 pmAdvisory Council Lunch Roundtable (VIP / Invite Only)AI Governance and Risk ManagementAdjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State UniversityRegistration Level:- VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: The Wine RoomAI is transforming cybersecurity, but it also introduces new risks. I’d like to explore how organizations can implement effective AI governance frameworks that ensure ethical use, transparency, and regulatory compliance. This topic would also cover AI risk management, particularly how to safeguard against AI-driven attacks and the integration of AI into cybersecurity operations. Given the regulatory landscape, we could discuss compliance with emerging AI regulations and how to prepare for the evolving expectations around AI use in security.12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmSecuring the Enterprise in the Age of AI: An Interesting ConundrumDirector, IT Software Engineering, DIRECTVRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: AmbassadorThe explosion of AI usage within enterprises has introduced threats and opportunities to the organization’s security posture. In this discussion, we will cover managing enterprise AI risks, enhancing cyber defenses using AI, enhancing the security team impact through AI, and a future-focused view of challenging issues in which AI may provide some relief.
Key takeaways include AI governance guidance, tips for building your security team, and tips for empowering responsible security and AI advocates within other organizations.
1:15 pmBuilding a Skills-Based Hiring Model for the FutureExecutive Director, CyberUpRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: ConsulateDeveloping a strong pipeline of cybersecurity talent is critical for organizations seeking to protect themselves in an increasingly complex threat landscape. This session will explore innovative approaches to building a skilled, diverse cybersecurity workforce including through education pathways, upskilling programs, apprenticeships, diversity initiatives, and public-private partnerships.1:15 pmHow Do We Solve the Human Problem of Cybercrime?TEDx and Cybersecurity Technology SpeakerRegistration Level:- Open Sessions
1:15 pm - 2:00 pmLocation / Room: AmphitheaterHave you ever wondered why cybercriminals seem one step ahead of your organization? Your workforce is falling for a variety of schemes; some are the same old, traditional scams, and AI fuels others. Let’s take a deep dive into the world of cybercrime, where we’ll uncover the human factors that make your staff vulnerable. From the psychology of hackers to the everyday mistakes we all make, this talk will explore the fascinating interplay between human behavior and cybersecurity. This session promises to be enlightening and entertaining. Let’s turn the tables on cybercrime together!
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmBuilding a Cybersmart Culture Through Ambassadorship: A Grassroots EffortHead of Cybersecurity, Nestlé Purina North AmericaRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: ConsulateThis session will empower you to develop a secure organizational culture. Gain invaluable insights on how to build a robust cybersecurity ambassador program from the ground up, tailored to your organization’s specific needs and goals. Discover effective strategies to customize awareness campaigns that resonate with your workforce, fostering a culture of vigilance and responsibility. Learn how to leverage the available tools to enhance your organization’s cybersecurity posture. Don’t miss this opportunity to create a secure environment and safeguard your organization’s valuable assets. Together, let’s build a culture where cybersecurity is everyone’s responsibility.
2:10 pmUnderstanding What DevSecOps Really IsDevSecOps Engineer, Lockheed MartinRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: AmbassadorSession description coming soon.
2:10 pmInfraGard Chapter Meeting [Open to all attendees]DPRK Targets Hospitals to Fund EspionageSupervisory Special Agent, FBIRegistration Level:- Open Sessions
2:10 pm - 2:55 pmLocation / Room: Amphitheater3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Beyond the Single Point of FailureLessons from Recent Vendor Incidents and Strategies for ResilienceVP, CISO, Enterprise MobilitySVP, CISO, HumanaVP, Global Cybersecurity and Privacy Risk Management, Reinsurance Group of AmericaCISO & SVP, First BankRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterRecent incidents involving major cybersecurity vendors like CrowdStrike and Microsoft have highlighted the critical issue of single-point failures in our digital defense ecosystems. This panel session delves into the aftermath of these events and explores the broader implications for organizational cybersecurity strategies. Our expert panel discusses:
- The dangers of over-reliance on single vendors: Explore the risks of putting all your security eggs in one basket.
- Developing a multi-vendor strategy: Balancing the benefits of integrated solutions with the need for redundancy and resilience.
- Incident response planning: Preparing for vendor-related outages or failures as part of your cybersecurity strategy.
- Future outlook: How the industry might evolve to address these challenges.
Gain valuable insights into creating more resilient security architectures that can withstand vendor-specific incidents.
- Alecto NetworksBooth: 150
Alecto Networks is a trusted leader in network security solutions with a legacy spanning over 30 years. Formerly known as Enterprise Consulting Group, our rebranding to Alecto Networks reflects our commitment to innovation and excellence in cybersecurity.
- Aqua SecurityBooth: 250
Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.
- Armis, IncBooth: 210
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- Cloud Security Alliance St. Louis ChapterBooth: n/a
- FortraBooth: 200
HelpSystems has long been known for helping organizations become more secure and autonomous. However, over the years, our customers have shared with us that it has gotten harder and harder to protect their data. As technology plays an increasingly important role in the way organizations operate, cyberthreats are evolving to become more powerful than ever before. If there’s one thing we’ve learned from being in an industry where the only constant is change, it’s that being adaptable is the best way to grow in the right direction. So we’ve listened to our customers’ concerns, problem-solved, and delivered with impressive results. Consequently, we’re a different company today — one that is tackling cybersecurity head-on.
That’s why HelpSystems is now Fortra, your cybersecurity ally. We’re bringing the same people-first support and best-in-class portfolio that you’ve come to expect from HelpSystems, only now we’re unified through the mission of providing solutions to organizations’ seemingly unsolvable cybersecurity problems. We offer leading solutions like data security, infrastructure protection, managed services, and threat research and intelligence. Throughout every step of our customers’ journeys, our experts are determined to help increase security maturity while decreasing the operational burden that comes with it. Because our team puts the same level of care into protecting our customers’ peace of mind as their precious data.
We’re driven by the belief that nothing is unsolvable.
We’re tenacious in our pursuit of a better future for cybersecurity.
We are Fortra. - Halcyon, IncBooth: 205
Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. Halcyon’s core platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes. To learn more and get a demo, contact us today.
- IllumioBooth: 120
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. - InfraGard St. Louis Members AllianceBooth: 290
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
- ISACA St. LouisBooth: 100
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Meetings are generally held the 3rd Wednesday of the month between September and May.
- ISC2 St. Louis ChapterBooth: 130
As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.
- KeysightBooth: 400
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- National Cybersecurity AllianceBooth: 155
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- PenteraBooth: 230
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.
- Saint Louis University Workforce CenterBooth: 450
The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber Security, Project Management, Agile, Analytics, Software Engineering and more.
- Savvy SecurityBooth: 280
Savvy automatically discovers and remediates your most toxic combinations of SaaS identity risk. It also allows you to guide users at scale towards proper security hygiene using just-in-time security guardrails.
- SentinelOneBooth: 440
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- WiCyS St. Louis Metropolitan AffiliateBooth: 160
- ZscalerBooth: 425
Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.
- Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLC
- Brian Lourie, ModeratorGlobal Cybersecurity Senior Manager, Mars
Brian supports a wide variety of business units like Mars Wrigley, Kind, VetSource, and Blue Pearl, to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a board member on the St. Louis Scott/AirForce ISC2 regional chapter and was president for three of those years. Brian is also a member of InfraGard and the St. Louis FBI citizens academy.
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Katie Boudreau, ModeratorCyber Talent Director, Mastercard; Secretary & Founder, WiCyS St. Louis Metro
- Eric FeyDirector of Elections, Saint Louis County Election Board
Eric is a lifelong St. Louisan and has been serving as the Democratic Director of Elections in St. Louis County since 2015. Eric received a BA in Political Science from Webster University and a MPPA (Public Policy Administration) from the University of Missouri St. Louis. Eric’s professional life has been devoted to public service, having worked in various roles in the field of public administration since graduating from college. As a matter of fact, Eric’s first foray into the field was serving as an election judge at the age of 19 while still in college. After an initial stint with the St. Louis County Board of Elections, Eric worked as an administrative assistant for the St. Louis County Council for four years prior to his tenure as Director of Elections.
Eric currently serves as President of the Missouri Association of County Clerks and Election Authorities (MACCEA) and Secretary of the International Association of Government Officials (IGO). In those roles Eric is primarily responsible for organizing professional development opportunities for fellow election administrators. Additionally, Eric serves as co-chair of the MACCEA legislative committee which entails legislative advocacy on behalf of MACCEA and frequent testimony in relevant committees regarding legislation pertinent to election administration.
Not only is election administration Eric’s occupation, but it’s also a labor of love. In 2021 Eric began co-hosting an election administration focused podcast called “High Turnout Wide Margins” along with Boone County Clerk Brianna Lennon. The purpose of the podcast is to create a forum for election administrators to share their experiences and professional accomplishments. In 2022 Brianna and Eric received a philanthropic grant to support the podcast. With this support Brianna and Eric traveled to the national conference of the Election Center where they interviewed election officials from across the country on the significant challenges facing the field of election administration. As the challenges facing election administration aren’t just domestic, Brianna and Eric traveled to Moldova and Hungary in 2022 to interview election officials in those countries about running elections in often under resourced and conflict prone situations. High Turnout Wide Margins just finished its second season after posting its 86th episode.
In his free time Eric enjoys volunteering to serve on international election observation missions. As a volunteer, Eric has observed elections in 12 countries. Eric’s most enjoyable activity, however, is spending time with his wife and two children.
- Robert GrahamCybersecurity Advisor and Coordinator for Missouri, DHS CISA
Mr. Graham serves as a Cybersecurity Advisor and Cybersecurity Coordinator for Missouri. Currently, based in Columbia, MO he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.
His programs coordinate cyber preparedness, risk mitigation and incident response. He provides Cybersecurity resource briefings, Cybersecurity assessments, and Incident Response planning to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.
Prior to joining CISA, Mr. Graham worked for Southwestern Power Administration (SWPA), one of four Power Marketing Administrations under the Department of Energy. While at SWPA, Mr. Graham served as the senior Information Security Officer, acting Chief Information Security Officer and as a Responsible Subject Matter Expert for both Supervisory Control and Data Acquisition (SCADA) and Operational Technology (OT) systems for the North American Energy Reliability Corporation (NERC) Critical Infrastructure Protection requirements.
Prior to working for the Department of Energy, Mr. Graham worked in the Insurance industry as a Networking and Telecommunications Technician, Security Administrator, Senior Security Administrator,
and Chief Information Security Officer.Mr. Graham spent 12 years active duty with the United States Air Force supporting the National Emergency Airborne Command Post (NEACP), the Strategic Air Command (SAC) Airborne Command Post (Looking Glass) and the B-2 Stealth Bomber. In addition, Mr. Graham served as an Air Force Technical Training Instructor for Aircraft Electrical Environmental Systems
- Chrissy PetersDirector of Elections, State of Missouri
Chrissy Peters is the Director of Elections for the State of Missouri. She has spent the majority of her professional career in state government and public service. She has worked at the Secretary of State’s office in the Elections Division for 16 years.
- Zachary Lewis, ModeratorAVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
Zach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving strategic growth. His leadership in negotiating vendor contracts, managing multi-million-dollar budgets, and chairing the Enterprise Risk Management Committee has resulted in substantial cost savings and operational efficiencies.
With a focus on aligning IT strategies with organizational goals, Zach has led successful cloud migrations, implemented robust cybersecurity measures, and established a culture of transparency and collaboration. His expertise extends to compliance with GLBA and FERPA regulations, managing cybersecurity training programs, and optimizing network infrastructure. Zach's passion for innovation, user-centric approach, and ability to build cross-functional teams have been instrumental in driving organizational success, enhancing cybersecurity defenses, and positioning the institution as a leader in health education and operational excellence.
Zach is a 2X recipient of Cyber Defense Magazine’s Top Global CISOs, was named 40 Under 40 Security Leaders by CDO Magazine, and was St. Louis Non-Profit CISO of the Year. He’s a recent graduate of the FBI CISO Academy. Zach provides his industry expertise to others by speaking at conferences, webinars, and universities throughout the country.
- Mike EhlersGlobal Sr. Manager, Information Security, Olin
Senior cybersecurity professional with years of experience (Engineer/Architect, Senior Manager, Director, and CISO roles) architecting and managing large scale IT Security, Network Infrastructure, and Development projects. Heavy experience collaborating with diverse cross-functional groups of people, both domestic and international. Recognized for building products, platforms, and IT teams from the ground up along with developing and implementing IT and OT (cyber) security standards, processes, and initiatives with high dollar impact, reduced costs, lower risk, increased revenue, and high customer satisfaction.
- Mike McGrailSr. Manager, Data Solutions Engineering, SentinelOne
Mike McGrail leads SentinelOne's data solutions engineering team, focused on using data to uplevel the security posture of customers moving on from legacy SIEM troubles.
After over a decade as a practitioner in the insurance industry, he moved to the vendor space to help more customers solve similar problems. Mike holds a master's degree in computer science from Georgia Tech and resides near Toronto, Ontario. - Reanna SchultzTeam Leader of Information Security, Garmin
Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.
- Bill HornPrincipal Product Security Architect, Bayer
Bill is an IT professional with over 20 years of experience driving DevOps, secure SDLC, cloud security, and security architecture initiatives. Holding both a Bachelor's and Master's degree in Cybersecurity and Information Assurance, he brings a strong academic foundation to his work. Bill's certification portfolio includes CISSP and GWAPT, among others. As a recognized expert, he regularly shares his insights as a presenter at his company's Security Champions speaker series.
- Debra BrownVice President, Savvy
Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate learner, book lover, and a devoted mother and wife in a loving, blended family.
- Minhal GardeziSolutions Architect, Aqua Security
Minhal Gardezi is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past three years. With a robust background in computer science, Minhal earned his Bachelor of Arts in Computer Science from Case Western Reserve University. His role at Aqua Security involves designing and implementing cutting-edge security solutions, leveraging his expertise to address complex challenges in the ever-evolving field of cloud native security. Minhal's blend of technical acumen and innovative problem-solving makes him a valuable asset to his team and a trusted advisor to clients seeking to safeguard their cloud environments.
- Yiannis VassiliadesCISO in Residence, Zscaler
Yiannis Vassiliades is currently serving as CISO in Residence at Zscaler, the global leader in Secure Access Service Edge (SASE) and Zero Trust IT Transformation. With over 25 years of experience in cybersecurity, Yiannis has been deeply committed to productizing transformative technologies that align with organizations’ strategic cybersecurity and risk objectives. He began his career specializing in Resilience and Disaster Recovery before diversifying his expertise to encompass various cybersecurity domains such as Security Analytics, Data Protection, Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Cyber Risk Management. Yiannis has held leadership roles in prominent enterprises including IBM, Raytheon, and CA Technologies (acquired by Broadcom), as well as contributing to the growth of emerging companies from their seed stages to acquisition. Prior to joining Zscaler, Yiannis served as the Chief Product Officer at Ostrich Cyber-Risk, where he spearheaded the development and launch of cyber risk quantification solutions. Before that, he played a founding role in establishing and expanding the MDR division at Sophos, which has since become the largest MDR service provider with over 20,000 customers. Yiannis holds a Bachelor of Science in Information Systems from University of Maryland and earned his MBA from Johns Hopkins University.
- Travis Nichols, ModeratorDirector of Information Security, Shelter Insurance
Travis Nichols is a seasoned leader in Information Security at Shelter Insurance, where he spearheads the safeguarding the organization’s digital assets. With a robust background in software development, cybersecurity, and management, Travis has consistently demonstrated his commitment to excellence and innovation. His journey is marked by a relentless pursuit of knowledge and dedication to fostering a culture of continuous improvement and learning, both within his team and the broader community. Travis’s leadership philosophy centers on growth, value creation, and enhancing the lives of those around him, including his wife and two grown children. Through his strategic vision and passion for leadership, Travis continues to drive impactful change and inspire those he leads. One of his favorite questions to ask is: “How can I help you be your best?”
- Bernie Frazier, SPHRSpeaker, Author & Career Strategist, CAREERCompass, LLC
Author of the highly acclaimed book, “Your Success is in YOU!: Empowering and Equipping You to Create Your Best Career Ever!”, Bernie Frazier, SPHR, is an author, speaker, career coach/strategist, and talent acquisition expert whose mission is to help people overcome barriers to create greater career success. Bernie has over 30 years of experience in the corporate recruiting space, has served as keynote speaker for Fortune 500 corporations and organizations, and coached clients globally from C-Suite executives to individual contributors. She has also served as the “Career Coach” on KSDK’s Today in St. Louis – the St. Louis NBC affiliate, shared timeless job search tips on SiriusXM and KTRS 550 AM radio in St. Louis, been featured in the New York Times and St. Louis American newspapers, and profiled in the St. Louis Business Journal.
To learn more about Bernie, please visit her website at www.CAREERCompassLLC.com.
- Renita Rhodes, ModeratorAdjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University
Renita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguarding critical information security controls and conducting audits of paramount significance.
Renita's commitment to knowledge dissemination is evident through her roles as an Adjunct Instructor at Maryville University and Harris-Stowe State University. She imparts her knowledge through various courses, spanning Cyber Law, Policy, and Compliance, Security Information and Event Management, Introduction to Information Security, Applied Programming - Python, Cybersecurity Operations, and Systems Analysis and Design.
Her academic journey includes a Bachelor's degree in Business Information Systems from Tennessee State University, a Master's degree in Information Management from Washington University in St. Louis, and a Cybersecurity Certificate from Saint Louis University. During her graduate studies, she published a whitepaper titled "Developing Dynamic PeopleSoft Field Security Applications: A PeopleSoft Developer's Guide."
Beyond her professional and academic achievements, Renita is a passionate cybersecurity awareness and training advocate. She actively engages in various organizations such as the NIST NICE Cybersecurity Careers Ambassadors Program and CyberUp, where she is a Board Member and initiatives that promote diversity, equity, and inclusion in the cybersecurity sector. Renita has also participated as a conference panelist and podcast guest discussing cybersecurity and AI.
- Tina LampeDirector, IT Software Engineering, DIRECTV
Tina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity – Leadership focus from Maryville University in St. Louis, Missouri. Tina is a specialized advocate of Business and Technology Strategies including Artificial Intelligence and other emerging technologies. Tina has demonstrated experience leading global teams to successful completion of complex technical software and infrastructure initiatives.
- Tony BryanExecutive Director, CyberUp
Tony, CyberUp’s Executive Director, has served the nonprofit community for more than 14 years. He spent nine years serving in the United States Army, where he was known as the youngest Military Police Sergeant in Brigade. Succeeding his time in the Military, Tony was appointed by the Governor of Missouri to serve on the Workforce Development Board and chosen to lead CyberUp. As the Executive Director of a nationally recognized organization, Tony remains passionate for growing apprenticeship opportunities to energize the country’s workforce. He was chosen to serve as the co-chair for the National Initiative for Cybersecurity Education (NICE) Apprenticeship Sub Working Group. Outside of work, you can see Tony adventuring outdoors or playing video games.
- Heather ReedHead of Cybersecurity, Nestlé Purina North America
Currently heading cybersecurity for Nestlé Purina Petcare North America, Heather Reed has a proven track record of making a positive impact on her organization and those she leads. With more than seven years of experience in security and compliance, she utilizes her unique background in marketing and learning & development to foster a cybersmart culture. Her passion for cybersecurity and dedication to driving tangible results make her an asset in the field.
- William SwoffordDevSecOps Engineer, Lockheed Martin
Navy Veteran with a current role as a Dev Sec Ops engineer focusing in infrastructure resiliency. Past careers in banking software, web application, and construction worker while through college. (Construction applies more to security than I ever thought) Also love coffee.
- Brian JacksonSupervisory Special Agent, FBI
- Happy Hour
- Josh KnoppVP, CISO, Enterprise Mobility
Josh Knopp is Vice President & CISO for Enterprise Mobility. In this role, Knopp is responsible for developing and overseeing the implementation of Enterprise’s global information security strategy in a manner that enables business and reduces friction. Knopp joined Enterprise in April 2016. He has more than 24 years of experience working in in the field of information security.
Currently, Knopp is a member of the Board of Directors and Executive Committee for the Global Center for Cybersecurity at Cortex, a member of the PCI Security Standards Council’s Board of Advisors, and an adjunct professor at Washington University in St Louis. He completed his Executive MBA from the University of Missouri – Columbia.
- Aman RahejaSVP, CISO, Humana
Aman Raheja has been at Humana since 2020. In this role, Aman is transforming the Information Protection program leveraging threat and risk-based approaches. He is building a strong team and proactive culture, while keeping the focus on serving our members and associates.
Prior to joining Humana, Aman served as Global CISO for BMO Financial Group, one of the top ten banks by asset size in North America, where he led transformative changes that focused on cross-disciplinary resiliency and business enablement capabilities.
Prior to BMO, Aman orchestrated and executed the Information Security strategy at Express Scripts. Aman also spent over seven years at Citibank, most recently serving as the Group Information Security Officer, leading security programs for CitiMortgage and OneMain Financial.
Aman serves on the Board of security organizations, ClearData and HITRUST, and is an Advisory Board member for SixThirty Cyber. He has created and shared an open information security strategy framework, B-I-C-T, that balances business value, industry standards, compliance and threat management.
- Erica WilsonVP, Global Cybersecurity and Privacy Risk Management, Reinsurance Group of America
Erica Wilson has more than twenty-five years of IT experience, majority of which have been directly in cybersecurity. She has worked in various industries including manufacturing, higher education, financial services and most recently reinsurance. She has served in all capacities of security, including the role of Chief Information Security Officer. Erica is currently the VP of the Global Security Risk Management for RGA. In this role, she serves as a key advisor for the organization regarding cyber and technology risks where she leads a dynamic team of professionals that ensures issues are effectively addressed and managed. Outside of work, Erica is an advocate for helping girls and women explore career options in STEM & Cyber. She is also serves as a Board member for CyberUp.
- Marc Ashworth, ModeratorCISO & SVP, First Bank
Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes