Download a copy of the Agenda HERE.
Download a copy of the Exhibitors & Sponsors HERE & Expo Floor Plan.
Download a copy of the Product Demos -- HERE.
AGENDA
WEDNESDAY MORNING KEYNOTE
CHRIS WEGGEMAN, LT. GEN USAF RETIRED, MANAGING DIRECTOR, CYBER & STRATEGIC RISK, DELOITTE RISK & FINANCIAL ADVISORY
Chris Weggeman is a Managing Director in Deloitte Risk & Financial Advisory. He leads in the Government and Public Services (GPS) sector within our Cyber & Strategic Risk (C&SR) Offering Portfolio as Executive Advisor for the Department of the Air Force (DAF) Mega Account and Strategic Advisor to the C&SR Offering Portfolio Leader. Chris is a highly experienced and decorated multi-domain warfighting Commander and strategist. His eminence spans leading and Commanding across the Defense, Air Power & Cyber Operations enterprises. He logged his first 25 years as a combat-proven F-16 fighter pilot and USAF Weapons School F-16 Instructor Pilot with 4 combat tours, and then served 9 years as a General Officer leading and commanding cyber forces and missions as the US Cyber Command Director of Strategy, Plans and Policy J5 and the Air Forces’s senior operational cyber leader culminating in his tours as the Commander, Air Forces Cyber and Deputy Commander, Air Combat Command. He is skilled in U.S. Department of Defense, Joint Staff, Air Force, Space Force, Enterprise Training, Strategy, Policy and Leadership. Chris has master’s degrees in Military Strategic Studies from USAF Air War College and Military Arts and Sciences from Army Command and General Staff College.
WEDNESDAY LUNCH KEYNOTE
DAN LOHRMANN, FIELD CHIEF INFORMATION SECURITY OFFICER (CISO), PRESIDIO
WHY DO SECURITY PROS AND TEAMS FAIL, AND WHAT CAN YOU DO ABOUT IT?
Why do cybersecurity and tech professionals (and their teams) fail? As a Michigan Government agency CIO, and enterprise-wide CISO, CTO and CSO, Dan Lohrmann has been studying this question for years – and built and managed many award-winning government teams.
Conventional wisdom says we need more staff training and technical security certifications. Others say higher salaries, a better understanding of the bad guys, bigger budgets, more executive leadership training or more top-level executive buy-in are needed. While all of these items certainly help, many security and technology staff with all of the above still fail to achieve desired results.
Packed with true government stories that will surprise, this keynote will challenge many technology and security career assumptions. You’ll learn seven ways to revitalize your role, team and your professional outlook – along with practical tips to implement.
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year from SC Magazine, Public Official of the Year from Governing Magazine and Computerworld Premier 100 IT Leader.
Lohrmann currently serves as the Field CISO, Public Sector for Presidio, a global digital services and solutions provider accelerating business transformation through secured technology modernization. Lohrmann leads cybersecurity advisory services for public sector clients at Presidio. Working with global CxOs and partners, Dan advises clients on cybersecurity best practices and solutions. He previously served as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor, Inc., a security awareness and training company.
Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Dan has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and non- profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility.
Lohrmann is the co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions, published by Wiley in November, 2021. His co-author is Shamane Tan, and cybersecurity expert residing in Australia. Dan is also the author of two earlier books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow.
Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana. Dan also serves as a Senior Fellow at the Center for Digital Government.
THURSDAY MORNING KEYNOTE
RON BUSHAR, CHIEF SECURITY OFFICER & MANAGING DIRECTOR, GOOGLE PUBLIC SECTOR
FORGING A RESILIENT FUTURE: AI, CYBER DEFENSE, PROTECTING TEXAS' CRITICAL INFRASTRUCTURE
As Chief Security Officer for Google Public Sector, my mission is to partner with government entities to enhance their security posture in an increasingly complex threat landscape. This keynote will address the urgent need for robust cybersecurity strategies to safeguard Texas' critical infrastructure – from energy grids and water systems to transportation networks and healthcare facilities. We are at a pivotal moment, facing sophisticated adversaries and the intersection of the use of AI for both harmful purposes and to advance our collective defense against these threats.
The address will explore three interconnected pillars crucial for Texas' resilience:
Critical Infrastructure Resiliency in a Heightened Threat Environment: We'll begin by outlining the specific threats facing Texas' critical infrastructure, including nation-state actors, ransomware gangs, and increasingly, AI-powered attacks. I'll detail the cascading consequences of successful breaches, emphasizing the impact on public safety, economic stability, and national security. We'll discuss a shift from purely preventative measures to a resilience-focused approach: assuming breaches will occur and building systems capable of rapid detection, response, and recovery. This includes strengthening incident response plans, conducting regular tabletop exercises, and fostering robust public-private partnerships.
Advancing Cyber Defense and Readiness: This section will delve into the concrete steps Texas organizations – both public and private sector – must take to bolster their defenses. Potential topics:
- Zero Trust Architecture: Moving beyond perimeter-based security to a model that verifies every user and device, regardless of location.
- Cloud Security Advantages: Leveraging the inherent security benefits of cloud platforms, including advanced threat detection, automated patching, and scalable security solutions.
- Supply Chain Security: Addressing the growing threat of attacks targeting software and hardware supply chains, emphasizing the need for rigorous vendor risk management.
- Workforce Development: The critical importance of investing in cybersecurity training and education to build a skilled workforce capable of meeting the evolving challenges. The talk will stress a shared responsibility model, emphasizing collaboration between state agencies, federal partners, and the private sector.
The AI Inflection Point: Threat and Opportunity: This is the core of the keynote. We'll explore the transformative impact of artificial intelligence on both sides of the cybersecurity battleground.
- AI-Powered Attacks: We'll dissect how adversaries are already using AI to automate attacks, create highly sophisticated phishing campaigns, generate deepfakes, and identify vulnerabilities at scale. This necessitates a proactive approach to understanding and mitigating these emerging threats.
- AI-Powered Defense: Crucially, we'll focus on how Texas can harness the power of AI to gain an advantage in cybersecurity. This includes using AI for:
- Threat Detection and Analysis: Identifying anomalous behavior and patterns that indicate malicious activity far faster and more accurately than traditional methods.
- Automated Incident Response: Speeding up containment and remediation efforts through AI-driven automation.
- Vulnerability Management: Proactively identifying and prioritizing vulnerabilities before they can be exploited.
- Predictive Security: Leveraging AI to anticipate future threats and adapt defenses accordingly.
- Deception technology: using AI to create and deploy realistic decoys.
Ron Bushar serves as the Chief Security Officer and Managing Director of Cyber solutions at Google Public Sector. In this role, he leads a diverse global team of cyber experts who empower Google Public Sector to safely and securely deliver customer mission outcomes and deliver Mandiant and Google’s unique platform of innovative security and cloud capabilities and solutions to protect critical missions, infrastructure, and national security interests worldwide.
Ron is a seasoned, highly effective, and innovative cyber security leader with over 27 years of experience in cyber defense operations, cybersecurity consulting, and incident response services in both the government and commercial sectors. Ron has a track record of successfully building strategic programs and dynamic teams that deliver innovative cyber solutions, ensure effective security, minimize organizational risk, and ensure mission outcomes for customers.
Prior to his work at Mandiant and Google, Ron served as the Director of the Department of Justice Security Operations Center (JSOC) where he led transformative efforts to redefine and restructure key information security and cyber defense operation capabilities. Ron also served as the Department’s Insider Threat Program Manager and liaison to the National Insider Threat Task Force. In previous roles, Ron built and led expert teams of cyber defense operators, incident responders, and red teams at several U.S. intelligence and defense department agencies. Ron began his career in the United States Air Force serving as an officer in the Information Warfare Aggressor Squadron. Ron holds an MS in Computer Information Systems from St. Mary's University and a BS in Electrical Engineering from Virginia Tech University.
THURSDAY LUNCH KEYNOTE
MARC RYLANDER, CHIEF COMMUNICATIONS OFFICER, GRPR PUBLIC AFFAIRS
MESSAGING WHEN YOUR HAIR IS ON FIRE: COMMUNICATING THROUGH A CRISIS
Marc Rylander guides clients with communications strategies, crisis communications implementation, communications policy development, press and media relations and training, and also leverages his many relationships in Austin and Washington to deliver winning government relations results. Prior to joining our team, he served as Director of Communications and Senior Advisor for the Office of the Attorney General of Texas. Today he provides consultative communications leadership to leading names in the construction industry, higher education, municipal and state government entities in Texas and beyond, local school districts, church-related and nonprofit organizations, public safety departments, global manufacturing space, and the legal field. Additionally, he publishes written materials and articles for clients, including opinion editorials, and has an extensive database of contacts in local, state, and national media outlets. Communications is a generational calling for Marc. His grandfather was an early broadcasting giant in Dallas/Ft. Worth who helped pioneer WFAA TV, after serving as a radio operator in World War II and then as a disc jockey at WFAA radio, before there was television in Texas. Growing up around a newsroom instilled a love in Marc for the ever-changing world of headlines and a strong understanding of the critical and necessary role of the media and the people involved in that arena. This upbringing provided him critical insight as he navigated communications efforts through some of the toughest events in Texas’ recent past, including: the aftermath of Hurricane Harvey, the complex Austin bombings, and tragedies at the Church at Sutherland Springs, Santa Fe High School, El Paso Wal Mart, and the 2016 attack on Dallas Police officers. During these events, Marc led or coordinated with White House and other federal, state, and local public safety communications offices. He has also led communications efforts for numerous state or local news events, including crises involving first responders, active shooters, issues at school districts, legal decisions, and broad array of other media-facing activities. Marc holds a bachelor’s degree in telecommunications (broadcast journalism) from Baylor University and earned three master’s degrees. The first part of his communications service was spent in local churches, including ten years on the executive staff at Prestonwood Church in North Dallas. He currently serves on the Board of Trustees of Houston Christian University, where he was Chairman of the Board in 2018-2019, and serves as President of the Board of the Celina Education Foundation in Celina, Texas. |
Marc’s passion is his family, travel, and all things outdoors, especially hunting, fishing, grilling, and enjoying ample time at the lake. He recently accomplished the feat of watching a baseball game in every Major League Baseball stadium in the game with his sons before they graduated high school. As a fifth generation Dallasite, Marc has extensively studied the history of North Texas and has a collection of historical Dallas memorabilia second-to-none. |
AGENDA
Download a copy of the Agenda HERE.
Wednesday, May 28, 2025 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
7:30 AM - 8:30 AM | Breakfast in Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 3:00 PM | Registration Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM | Welcome Remarks | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 10:00 AM | Wednesday Morning Keynote - Chris Weggeman | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:00 AM | Break in the Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:30 AM - 11:30 AM | Risk to the Nth-Party Degree | AI and the Future of Work: Transforming Legal Data Challenges & e-Discovery | AI-Driven Threats to Critical Infrastructure: Protecting the Systems That Matter Most | Building Cyber Resilience: Strategies for Thriving Amidst Digital Disruptions | From Learning to Defending – Fast-Tracking Cybersecurity Talent with Hands-On Training | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:30 AM | Wednesday Lunch Keynote - Dan Lohrmann | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM | Discovering Cyber and Operational Risk Through Network Visibility | How to Build a Strategic InfoSec Team: Elastic Security’s Journey | Securing Cyber Physical Systems Using AI Enabled Platforms | How to Show the Value of the Security Program | Balancing Innovation and Legacy: Modernizing Cybersecurity Infrastructure for a Hybrid Digital Landscape | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:00 PM | Mastering Risk and Compliance in the AI Era: The Five Cs Framework | Modernizing the Cybersecurity Infrastructure - Post-Quantum Encryption & NIST 2035 Mandate for Compliance | Mastering IT Inventory: Automating Discovery, Classification, and Risk Assessment in Large Federated Environments | From Grid to Ground: Securing Texas’ Critical Infrastructure Against Modern Cyber Threats | State of Texas: Journey to Modern Phishing-Resistant FIDO Authentication | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:00 PM - 3:30 PM | Break - Exhibit Hall Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:30 PM | The Intersection of Cybersecurity, Fraud, and Business Risk Management | Enhancing Mission Success Through Cloud Security and Visibility | Compliance Your End Users Love - A Modernization Story with Texas State University | Implementing an Effective Vendor Risk Management Program | Using Lessons Learned to Better Audit Incident Response - How to Get the Most Out of Plans, Processes and Tabletop Exercises | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:30 PM | Conference Ends for the Day | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Thursday, May 29, 2025 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 8:30 AM | Breakfast in Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 4:30 PM | Registration Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM | Welcome Remarks | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 10:00 AM | Thursday Morning Keynote - Ron Bushar | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:00 AM - 10:30 AM | Break in the Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:30 AM | Advance Your Cyber-Resiliency: Dissecting A Modern Ransomware Attack | The Scourge of a Legacy Security Infrastructure | The Dark Web Explained: Worse Than You Think | DMARC Compliance - The Latest Updates and Requirements for 2025 | Artificial Intelligence, Tech Revolutions, and the Future of Work Unleashed | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:30 AM - 12:50 PM | Thursday Lunch & Keynote - Marc Ryland | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM | CPRIT's Journey to a Modern Security Service Edge | Utilizing the SLCGP to Enhance Our Cybersecurity Program | How to Recover Active Directory When Every Second Counts | Overcoming Common Pitfalls in SOC Operations and Optimizing with AI | So You Think You Want To Be a CISO? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:45 PM - 2:00 PM | Break - Exhibit Hall Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:00 PM | Gate Crashing: How Traditional Email Defenses Fail Against Modern Attacks | Optimizing Security Identity for a Modern Workforce | D-MARC, Get Set, Go | TBA | Cybersecurity Risk Management: Building a Process & Defining Your Risk Tolerance | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:00 PM | Conference Ends |