Elizabeth Stephens
DBS Cyber LLC
Elizabeth is the CEO of DBS Cyber LLC, a company whose mission is to protect American families. She is a cybersecurity expert with a distinguished background leading intelligence teams in high-stakes environments. Formerly the Director of Data Center Cyber Risk Intelligence at Microsoft, Elizabeth’s work focused on the safety of critical digital infrastructure. Her experience includes evaluating cyber risks, providing actionable intelligence, and developing best practices to secure cloud operations.
A Nashville native and Memphis born retired United States Marine Corps veteran, Elizabeth completed three combat deployments to Iraq. Following her graduation from the United States Naval Academy, she earned an MS in Business Administration and Management from Boston University. She is also capstone pending in the Masters in Cybersecurity Program at California State University and has completed a MS in Public Leadership from USF.
Elizabeth’s career is marked by a trailblazing spirit. She holds the distinction of being the first black female graduate of the Naval Academy to become a selected Fleet Naval Aviator in the Marine Corps. Her other firsts include piloting the CH-46E, attaining tactical aircraft commander status, and becoming the first woman to fly the MV-22 Osprey. Elizabeth’s courage and leadership earned her an Individual Air Medal for her exceptional actions during a critical period in the first democratic elections in Iraq’s history.
The cyber threat landscape is a battlefield. Outdated defenses leave us vulnerable. This manifesto unveils strategies for proactive risk management, intelligence-driven action, and a culture of cyber vigilance ‚Äì it’s the modern survival guide for individuals and organizations.
Jim West
TopCyberPro.com
Jim West possesses more than 32 years’ experience in the Information Technology field with over 20 years focused within Cybersecurity. He has worked in the IT and Security industry across many sectors of commercial, space, federal, and defense with expertise in Biometrics, Risk Management, Security Analysis, and Network and Systems Auditing. Jim holds multiple certifications which include; CISSP-ISSEP, ISSMP, GSLC, GCIH, GSNA, GPEN, G2700, PMP, C-CISO, S-CISO and many others. Jim has been invited to speak at Cyber Security conferences and events worldwide to include the NSA IA Symposium, Texas Technology Summit, CSfC Tech Day, TechNet Korea, Global CISO Forum, Cyber Bowl, Best Cyber Ranger, and many others. He was shortlisted as a finalist for Personality of the Year for the 2018, 2019, and 2020 Cyber Security Awards, and won in 2021. Jim was recently awarded the 2024 Cyber Leader of the Year award by Cyber First. West is also an award-winning author and writer. Jim’s “Cyber Security and Test Tips” eBook placed in the “100 Best Cyber Security Books of All Time” list by Bookauthority.org. For years he has developed and overseen IT and Cybersecurity strategy and solutions which solve complex problems for National Security systems and networks. West possesses a wide range of IT specialization to include systems integration, enterprise-wide and cloud security, network engineering, penetration testing, and more.
There is an undeniable need for security policies and mitigation strategies to review more security principles than the common CIA triad of confidentiality, integrity, and availability that most security professionals are trained on.
Dr. Joe Perez
NC Department of Health & Human Services
Dr. Joe Perez is a remarkable professional who has made an impressive impact on the world of IT, health & human services, and higher education. With advanced degrees in education, Joe started his career as an educator and continued to further his education by earning a doctorate in education with a double minor in computers and theology. His career focus changed to IT in the early 1990’s when he started working as a Computer Consultant at NC State University. Three promotions later, Dr. Perez ended his successful 25-year career at NC State as Business Intelligence Specialist when he took another promotion to become Senior Business Analyst at the NC Department of Health & Human Services (DHHS) in the fall of 2017.
Notably, Dr. Perez was featured on a billboard in the iconic Times Square, a testament to his remarkable achievements and influence in the world of IT, health & human services, and higher education. This recognition, along with his Top 10 Thought Leader Rankings in IT Strategy & Big Data on Thinkers360, LinkedIn Top Voice in Data Analytics, and Gartner Peer Community Ambassador of the Year, reflect his dedication and impact in the industry.Having achieved significant success throughout his career, Dr. Perez’s accomplishments include being promoted to Senior Systems Analyst and Team Leader, a position he has excelled in while showcasing his expertise and leadership skills. In addition to his full-time analytics/BI leadership role at DHHS, Joe was named fractional Chief Technology Officer at a North Carolina firm in October 2020. An Amazon best-selling author with multiple #1 new releases, more than 17,000 followers on LinkedIn, and several professional certifications, he has consistently proven to be a much sought-after resource, highly-recommended international keynote speaker, data analytics & visualization expert, and specialist in efficiency and process improvement.
Perez, a recipient of the IOT Industry Insights 2021 Thought Leader of the Year award, speaks at numerous conferences each year, and continues to be in high demand to this day, expanding his reach into more than twenty countries around the globe, impacting thousands. Thanks to these outstanding accomplishments and influential presence as a leading expert in the industry, Dr. Perez has been welcomed into several prestigious Thought Leader communities and invited to co-host an online talk show called Mind2Mind.
Dr. Perez’s passion for teaching has never waned, whether as a speaker, workshop facilitator, podcast guest, conference emcee, or team leader; inspiring countless individuals to strive for excellence. He cherishes spending time with his wife and children, who he considers to be the “best things that ever happened to me.” Besides being a gifted musician, singer, pianist, and composer, Joe serves as a speaker, interpreter, and music director for his church’s Hispanic ministry. He even manages to publish a monthly military newsletter, The Patriot News, which has gained widespread recognition. His unwavering commitment to his community is an inspiration to all. To stay in shape, Perez hits the gym, and he loves watching Star Trek reruns to relax. “I’m a firm believer that if I’m not innovating, then I’m stagnating,” says Joe. His devotion to innovation, his boundless energy, and his constant drive for excellence are the hallmarks of a truly exceptional individual.
How do you get from being in data denial to being data-driven? Why should you care? Do you make business decisions only with your gut? What do KPIs have to do with ROI? Get answers to these questions and more. Discover how to overcome cognitive bias and see the relevance of the four V’s of Big Data.
Keyaan Williams
Cyber Leadership and Strategy Solutions, LLC
Keyaan J Williams has been building and managing cybersecurity and privacy programs to support enterprise risk management for more than two decades. After many years in various departments of the Centers for Disease Control and Prevention (CDC), he started a global consulting firm that supports government, critical infrastructure, and commercial customers. Keyaan actively serves as a board member for commercial and non-profit companies. He also serves as a mentor and advisor for corporate directors and early-stage entrepreneurs. He regularly shares interesting insights on LinkedIn based on ideas he has published in books and professional journals.
The stress and pressure facing CISOs is the result of the role being misclassified, out of position, underfunded, and a dumping ground for anything that nobody else wants to deal with. This session will focus on what the CISO should do and where the role fits in an organization to maximize value.
Todd Bell
Todd Bell is a globally recognized expert in the fields of technology transformation, resilient cybersecurity programs, and providing invaluable insights to startups ranging from new ventures to Global Fortune 500 companies. With a distinguished career as a Chief Information Officer (CIO) and Chief Information Security Officer (CISO), Todd has left an indelible mark on the international stage by safeguarding the sensitive information of millions of consumers worldwide to major technology transformations. His impact is evident in the development of new cyber programs and the enhancement of existing initiatives that have stood the test of time.
In addition to his corporate leadership roles, Todd has served as a Board Director for two Colorado public utilities. His expertise extends globally as a Board Advisor to Forticode in Melbourne, Australia, Board Advisor to Versive, and Board Advisor to Cloud Central in Canberra, Australia, along with participation in the Digital Directors Network. This international experience has positioned him to fulfill roles in company operations, VC fundraising, P&L management, financial auditing, and a building companies.
Todd’s influence in the technology and cybersecurity space is further underscored by his global publications, where he shares his extensive knowledge and contributes to advancing best practices in the industry. He actively collaborates with expert networks, providing advisory services to Wall Street Investors and Private Equity Investors.
Todd holds an MBA degree from Regis University, a bachelor’s degree, and a Masters Project Manager Certification from Regis. His credentials include a PMP certification from the Project Management Institute, a Corporate Governance credential (SOX) from Tulane University, CISSP from Information Security ISC2, ITIL Foundation v4, Microsoft/LinkedIn Artificial Intelligence/Machine Learning Certifications, and an Exercising Leadership credential from Harvard University Online.
Tamika Bass
Tamika Bass is an Information Security professional with more than 16 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Cybersecurity space.
Jon-Rav Shende
Jon Rav Shende, a technology enthusiast, embarked on his professional journey in Oil and Gas, briefly exploring SCADA before transitioning into the dynamic world of IT. With a career spanning over 15+ years, he has passionately delved into cybersecurity, cloud computing, and information technology systems.
Over his career, he has held roles within Ernst and Young, Head of Security Engineering for a Fortune 200 and Global CISO. He is also an advisory board member for several technology startup organizations. With an educational background, including an Advanced Diploma in Computing from Oxford University and an MSc in IT Security, Digital Forensics, and Computer Crime Law from Royal Holloway, University of London, a Chartered IT Professional and a Fellow of the British Computer Society, Jon Shende has contributed significantly to the field of security and Cloud Services having worked within Savvis Cloud and AWS cloud services for near ten years. As part of his Masters thesis, Jon created a model for Cloud Forensics as a Service, a thesis he did not submit but instead shared publicly. It has been cited and used as a reference in academia and industry.
Jon Shende’s professional journey has traversed diverse verticals, including healthcare, telecommunications, and financial services. This breadth of experience underscores his versatility and adaptability, making him a valuable asset in any industry.
Jon Shende’s career demonstrates a solid commitment to advancing cybersecurity practices and technologies, addressing complex challenges in IT and digital environments‚ (CIO TechWorld)‚ (CIO TechWorld)‚ (EC-Council Uni)‚ (Clarity)‚ (BigML.com – Machine Learning made easy).
As Security Executives today, our role transcends protection into pioneering and future-proofing our organizations against emerging Gen AI threats.
This discussion explores threats of Gen AI and how we can create AI Security programs considering that AI can be used to fortify or compromise security
George Dobrea
Co-founder and CEO of XEDUCO Institute, George Dobrea is a cybersecurity expert and a well-known technical instructor with more than 35 years of business experience in providing consulting and training services to military, commercial and public organizations in 30+ countries. He was awarded fifteen time by Microsoft as an MVP for Security and six times by EC-Council as ‘Instructor of The Year’.
Discover how to protect your organization by integrating cyber and business risk with NIST CSF 2.0, NIS2, and DORA. Join us to learn about the latest frameworks, ensuring compliance and enhancing resilience against threats through a unified, strategic approach. Secure your company’s future today!
Favour Femi-Oyewole
Favour Femi-Oyewole is not just a distinguished professional; she’s a visionary author and a vibrant member of the Forbes Technology Council. As the Group Chief Information Security Officer (GCISO) and Data Protection Officer (DPO) at Access Bank Plc, Favour champions the frontier of cybersecurity. Her previous tenure as the Group Head of Enterprise Risk Management at the Nigerian Stock Exchange saw her expertly helm the Information Security, Business Continuity, and Enterprise Risk Management departments.
A pioneer in her field, Favour is the first African woman to earn the title of Blockchain Certified Professional. Her expertise is further evidenced by her certifications as a Certified ISO 27001:2013 Lead Implementer Trainer. Her academic pedigree is illustrious, with credentials from the University of Liverpool, Harvard Kennedy School (HKS) – Harvard University, MIT, Stanford Graduate School of Business, Columbia Business School, London Business School, and Saïd Business School, University of Oxford: Executive Education.
Favour has been a ground-breaking member of Nigeria’s Cybercrime Advisory Council, where she led the Standard and Evaluations Committee, setting the stage for robust cybersecurity measures across all sectors in Nigeria. Her influence extends globally as she serves on advisory councils for several multinational companies and holds the prestigious position of first Vice-Chair of the Global C|CISO Scheme Committee.
Favour’s relentless pursuit of knowledge and her exceptional leadership skills have recently been further enhanced by her completion of two prestigious programs: Master Storytelling for Authentic Leadership from Stanford Graduate School of Business and the Oxford Advanced Management and Leadership Programme from Saïd Business School, University of Oxford.
Her certification portfolio is vast, spanning across digital realms including IT, cybersecurity, data protection, privacy, governance, risk management, and compliance. She holds vendor-specific certifications from Microsoft, Cisco, and Checkpoint, and vendor-agnostic certifications like PECB. FO’s accolades include being a Cisco Certified Security Professional, Checkpoint Security Administrator, and the first female COBIT 5 Assessor in Africa.
Favour’s academic achievements are equally impressive. She holds a B.Sc. in Computer Science from Ogun State University, two M.Sc. degrees in Computer Science from the University of Nigeria, Nsukka, and in Information Security from the University of Liverpool, UK. She is currently completing her doctorate at Covenant University, Nigeria, and has a Postgraduate Diploma in Digital Business from MIT and Columbia Business School.
With over 25 years of experience, Favour specializes in Information Technology & Operations, Information and Cyber security risk, and digital excellence, particularly in high-pressure, large-scale environments. Her diverse background and expertise have made her a standout figure in resolving complex digital technology challenges and excelling as a Global CISO.
Favour’s contributions have garnered international acclaim. Favour has been recognized with several awards and is a regular speaker at industry conferences. She made history as the first woman to win the Global Certified CISO (C|CISO) of the Year 2017 from the EC-Council, USA. She was named one of Africa’s Top 50 Women in Cybersecurity in 2020 and the Information Security Woman of the Year in Nigeria for 2021. In 2022, she was recognized by Leading Tech Magazine as one of the Top 10 Cybersecurity Leaders in the USA.
Favour’s story is one of pioneering achievements, unwavering dedication, and a relentless pursuit of excellence in the dynamic world of cybersecurity. Her journey continues to inspire and set new standards across the globe.
Dick Wilkinson
Proof Labs CTO
Dick has 22 years of computer science experience, including five years as a cybersecurity lab director for the Office of the Secretary of Defense (OSD). He holds technical certifications as a penetration test engineer and Chief Information Security Officer. Dick is an internationally recognized cybersecurity leader, published author, and a member of the Forbes Technology Council.
If you don’t trust AI – attend this session. AI has arrived, whether we like it or not. CISO’s are now tasked with controlling an new attack surface that behaves differently than anything else in your risk purview. What lens do we need to use balance risk and business outcomes when dealing with AI?
Cassandra Dacus
Cassandra Dacus brings distinguished experience in cybersecurity leadership, GRC strategy development, and technical security management with a proven track record spanning diverse sectors including education, non-profit, and cybersecurity. Throughout her tenure, Cassandra has demonstrated a commitment to driving transparency and fostering stakeholder collaboration.
Cassandra’s dedication to proactive risk management is evident in her continuous monitoring and communication of risks to senior leadership, driving urgency and prioritizing efforts to strengthen organizational security postures. She has led critical infrastructure projects, identifying and mitigating risks to business operations while ensuring alignment with regulatory requirements. Her expertise extends to incident management and information security governance. Cassandra is a strategic planner and forward-thinking leader who shows commitment to excellence and provides customer service that yields organizational progressive results.
Beyond her professional roles, Cassandra is deeply committed to enhancing diversity and inclusion within the cybersecurity community. As the President of Cyversity’s Atlanta Chapter, she has facilitated partnerships, organized events, and developed innovative programs to bridge workforce gaps and empower women, underrepresented minorities, and veterans in cybersecurity. Cassandra received White House recognition for spearheading Cyversity’s first DOL Registered Cybersecurity Apprenticeship program at the Biden-Harris Administration’s 120-Day Cybersecurity Apprenticeship Sprint culmination event (attended by White House dignitaries and representatives from the U.S. Departments of Labor, Commerce, and Homeland Security) aimed at developing and training a skilled and diverse cybersecurity workforce. Cassandra holds a Bachelors degree in Computer Science from Clemson University and several industry-leading certifications, including CISSP, CISM, GIAC and Associate C|CISO. She is a member of prestigious organizations such as the National Center for Women & International Information System Security Certification Consortium, further demonstrating her commitment to advancing cybersecurity and promoting diversity and inclusion.
Ed Adams
Security expert with 20+ years of experience, he’s served as CEO of Security Innovation and held senior positions at Rational Software, Lionbridge, and MathSoft. Ponemon Institute Research Fellow, Privacy by Design Ambassador for Canada, and recipient of multiple industry awards. He’s on the board of Cyversity, a non-profit helping underrepresented minorities in cybersecurity.
He’s presented to thousands at security industry events, has a best-selling book titled “Yourself in Cyber: Security Careers Beyond Hacking” and co-authored “The Cyber Elephant in the Boardroom”. Host of Ed TALKS, an online cybersecurity talk show where experts discuss approaches to securing modern ecosystems.
Mapped to the NICE framework, this talk explores the many roles associated with cybersecurity — both those whose primary job function is security as well as those who build and operate the applications and infrastructure that run our digital enterprises.
Susan Lam
Susan Lam is a resourceful and multi-disciplined senior Enterprise Risk Management and Governance leader with a proven track record of developing and leading strategic initiatives and innovations in dynamic and fast-paced environments. She currently serves as the Chief Risk Officer at Bakkt, overseeing Enterprise Risk Resilience, which comprises the Enterprise Risk Management and Cybersecurity programs. One of Susan’s primary responsibilities is to collaborate with various risk domain owners to proactively identify and address risks that could otherwise impede the company’s ability to meet its business goals and objectives. Before joining Bakkt, Susan held the position of VP for Cybersecurity, Risk, and Compliance at Fiserv’s Digital Payments and Risk Solutions business. She also worked at Equifax as the VP of Information Security and M&A, where she led a team of Business Information Security Officers (BISO) supporting business units and overseeing the merger and acquisition process.
Coming Soon
Regina Grogan
Regina Grogan is a seasoned cybersecurity professional, privacy professional & technology leader. With a diverse background spanning cloud engineering, data assurance, and information security, Regina has made significant contributions to some of the world’s leading tech companies.
Her expertise spans a wide range of areas, including Identity and Access Management (IAM), threat hunting, vulnerability management, and cloud platforms such as AWS and Google Cloud Platform.
She is currently serving as the Agency Information Security Officer, so Regina is at the forefront of protecting public interests through robust data assurance and privacy programs. Her expertise in creating comprehensive, compliance-focused documentation while adhering to state and federal regulations showcases her commitment to strengthening public trust in digital systems.
Regina’s educational background includes a Bachelor’s Degree in Business from the University of Utah and advanced studies in Cybersecurity at Stanford University. And a certificate in Change Management from Macquarie University in Sydney, Australia. She has been featured in Yahoo Finance and US News and World Report, focusing on security awareness in the public domain.
We are always told that our users are the “weakest link”. Why?
I will delve into the intersection of psych and security, examining how behavior impacts security outcomesYou will learn strategies for creating a security culture within the org by understanding cognitive biases and social communication”
Caleb Barlow
Caleb Barlow is one of the leading subject matter experts in the fields of cyber incident response, cyber security skill development, and training.
Prior to joining Cyberbit ,Caleb was CEO of Cynergistek/Redspin, a publicly traded cyber security services firm operating in regulated industries including healthcare and the defense industrial base. Prior to that, Caleb spent 16 yeNiars at IBM, most recently leading the IBM X-Force Threat Intelligence organization. In 2016 he built X-Force Command – part of a $200M IBM investment in global incident response services, including updated watch floors, the industry’s first immersive cyber range and an incident command system for responding to major cyber incidents. In 2018 he invented the Cyber Tactical Operations Center, a first-of-its-kind training, simulation and security operations center on a semi-truck, for which he won an Edison award.
Caleb serves on the board of Maltego. A frequent speaker educating boards on cyber security, he has appeared on the TED stage, the Today Show, and as an RSA keynote, and he regularly appears on national news broadcasts as well as in major publications such as the Wall Street Journal, The Washington Post, USA Today and The New York Times. He has testified to the US Congress on information security, and he was invited by the President of the UN General Assembly to discuss his views at the United Nations.
From the Classroom to the Boardroom: The Rise of Human-Centric Cybersecurity
The CISO’s responsibility is shifting from technical to strategic leadership. As cybersecurity becomes a board-level concern, how can we create new and innovative methods to evolve you, and your team’s human performance, moving beyond traditional training to create a culture of cyber resilience, allowing us to confidently respond to our board when asked: “is your operation ready?”
This session will answer these questions by drawing conclusions from over 1 million hours of live cyber exercises, offering a unique perspective on readiness, decision-making, growing and retaining cybersecurity talent as it relates to the role of the future CISO.
Tony UV
Red, AI, & Blue – Prescriptive Roadmap for Red Team + Blue Team Efforts leveraging AI
Beyond the AI adoption craze in both tech and cyber is the ongoing requirement for corporations to become more innovative with AI backed capabilities that lend to greater efficiencies in security programs. In this talk, you’ll be introduced on how to leverage organizational level threat models to create a framework for incorporating AI in offensive and defensive measures. As the organizational threat model builds a threat model for the company and your security program, a blueprint for offensive and defensive measures take shape with ample areas where AI can assist in streamlining various initiatives, such as (but not limited to) OSINT, attack surface management, remediation guidance, cloud IAM hardening, defining escalation matrices, defining automated response playbooks, and crafting a menu of attack patterns inspired by MITRE taxonomies. All of this prescriptive info can be sourced from strategic and selective prompt commands using various public and private AI sources. From creating a menu of attack patterns that support threat objectives in a threat model to scenario-based IR tabletops – a framework for leveraging AI to scale and execute red and blue team initiatives will be covered.