Download a copy of the Agenda HERE.

Download a copy of the Exhibitors & Sponsors HERE & Expo Floor Plan.

Download a copy of the Product Demos -- HERE.

AGENDA

WEDNESDAY MORNING KEYNOTE

CHRIS WEGGEMAN, LT. GEN USAF RETIRED, MANAGING DIRECTOR, CYBER & STRATEGIC RISK, DELOITTE RISK & FINANCIAL ADVISORY

Chris Weggeman is a Managing Director in Deloitte Risk & Financial Advisory. He leads in the Government and Public Services (GPS) sector within our Cyber & Strategic Risk (C&SR) Offering Portfolio as Executive Advisor for the Department of the Air Force (DAF) Mega Account and Strategic Advisor to the C&SR Offering Portfolio Leader. Chris is a highly experienced and decorated multi-domain warfighting Commander and strategist. His eminence spans leading and Commanding across the Defense, Air Power & Cyber Operations enterprises. He logged his first 25 years as a combat-proven F-16 fighter pilot and USAF Weapons School F-16 Instructor Pilot with 4 combat tours, and then served 9 years as a General Officer leading and commanding cyber forces and missions as the US Cyber Command Director of Strategy, Plans and Policy J5 and the Air Forces’s senior operational cyber leader culminating in his tours as the Commander, Air Forces Cyber and Deputy Commander, Air Combat Command. He is skilled in U.S. Department of Defense, Joint Staff, Air Force, Space Force, Enterprise Training, Strategy, Policy and Leadership. Chris has master’s degrees in Military Strategic Studies from USAF Air War College and Military Arts and Sciences from Army Command and General Staff College.

WEDNESDAY LUNCH KEYNOTE

DAN LOHRMANN, FIELD CHIEF INFORMATION SECURITY OFFICER (CISO), PRESIDIO

WHY DO SECURITY PROS AND TEAMS FAIL, AND WHAT CAN YOU DO ABOUT IT?

Erica Ford picture

Why do cybersecurity and tech professionals (and their teams) fail? As a Michigan Government agency CIO, and enterprise-wide CISO, CTO and CSO, Dan Lohrmann has been studying this question for years – and built and managed many award-winning government teams.  

Conventional wisdom says we need more staff training and technical security certifications. Others say higher salaries, a better understanding of the bad guys, bigger budgets, more executive leadership training or more top-level executive buy-in are needed. While all of these items certainly help, many security and technology staff with all of the above still fail to achieve desired results. 

Packed with true government stories that will surprise, this keynote will challenge many technology and security career assumptions. You’ll learn seven ways to revitalize your role, team and your professional outlook – along with practical tips to implement.

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year from SC Magazine, Public Official of the Year from Governing Magazine and Computerworld Premier 100 IT Leader.

Lohrmann currently serves as the Field CISO, Public Sector for Presidio, a global digital services and solutions provider accelerating business transformation through secured technology modernization. Lohrmann leads cybersecurity advisory services for public sector clients at Presidio. Working with global CxOs and partners, Dan advises clients on cybersecurity best practices and solutions. He previously served as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor, Inc., a security awareness and training company.

Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Dan has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and non- profit institutions.

Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility.

Lohrmann is the co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions, published by Wiley in November, 2021. His co-author is Shamane Tan, and cybersecurity expert residing in Australia. Dan is also the author of two earlier books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow.

Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana. Dan also serves as a Senior Fellow at the Center for Digital Government.

THURSDAY MORNING KEYNOTE

RON BUSHAR, CHIEF SECURITY OFFICER & MANAGING DIRECTOR, GOOGLE PUBLIC SECTOR

FORGING A RESILIENT FUTURE: AI, CYBER DEFENSE, PROTECTING TEXAS' CRITICAL INFRASTRUCTURE

As Chief Security Officer for Google Public Sector, my mission is to partner with government entities to enhance their security posture in an increasingly complex threat landscape. This keynote will address the urgent need for robust cybersecurity strategies to safeguard Texas' critical infrastructure – from energy grids and water systems to transportation networks and healthcare facilities. We are at a pivotal moment, facing sophisticated adversaries and the intersection of the use of AI for both harmful purposes and to advance our collective defense against these threats. 

The address will explore three interconnected pillars crucial for Texas' resilience: 

Critical Infrastructure Resiliency in a Heightened Threat Environment: We'll begin by outlining the specific threats facing Texas' critical infrastructure, including nation-state actors, ransomware gangs, and increasingly, AI-powered attacks. I'll detail the cascading consequences of successful breaches, emphasizing the impact on public safety, economic stability, and national security. We'll discuss a shift from purely preventative measures to a resilience-focused approach: assuming breaches will occur and building systems capable of rapid detection, response, and recovery. This includes strengthening incident response plans, conducting regular tabletop exercises, and fostering robust public-private partnerships. 

Advancing Cyber Defense and Readiness: This section will delve into the concrete steps Texas organizations – both public and private sector – must take to bolster their defenses. Potential topics: 

  • Zero Trust Architecture: Moving beyond perimeter-based security to a model that verifies every user and device, regardless of location. 
  • Cloud Security Advantages: Leveraging the inherent security benefits of cloud platforms, including advanced threat detection, automated patching, and scalable security solutions.
  • Supply Chain Security: Addressing the growing threat of attacks targeting software and hardware supply chains, emphasizing the need for rigorous vendor risk management. 
  • Workforce Development: The critical importance of investing in cybersecurity training and education to build a skilled workforce capable of meeting the evolving challenges. The talk will stress a shared responsibility model, emphasizing collaboration between state agencies, federal partners, and the private sector.

The AI Inflection Point: Threat and Opportunity: This is the core of the keynote. We'll explore the transformative impact of artificial intelligence on both sides of the cybersecurity battleground.

  • AI-Powered Attacks: We'll dissect how adversaries are already using AI to automate attacks, create highly sophisticated phishing campaigns, generate deepfakes, and identify vulnerabilities at scale. This necessitates a proactive approach to understanding and mitigating these emerging threats. 
  • AI-Powered Defense: Crucially, we'll focus on how Texas can harness the power of AI to gain an advantage in cybersecurity. This includes using AI for: 
    • Threat Detection and Analysis: Identifying anomalous behavior and patterns that indicate malicious activity far faster and more accurately than traditional methods. 
    • Automated Incident Response: Speeding up containment and remediation efforts through AI-driven automation. 
    • Vulnerability Management: Proactively identifying and prioritizing vulnerabilities before they can be exploited. 
    • Predictive Security: Leveraging AI to anticipate future threats and adapt defenses accordingly. 
    • Deception technology: using AI to create and deploy realistic decoys.

Ron Bushar serves as the Chief Security Officer and Managing Director of Cyber solutions at Google Public Sector. In this role, he leads a diverse global team of cyber experts who empower Google Public Sector to safely and securely deliver customer mission outcomes and deliver Mandiant and Google’s unique platform of innovative security and cloud capabilities and solutions to protect critical missions, infrastructure, and national security interests worldwide.

Ron is a seasoned, highly effective, and innovative cyber security leader with over 27 years of experience in cyber defense operations, cybersecurity consulting, and incident response services in both the government and commercial sectors. Ron has a track record of successfully building strategic programs and dynamic teams that deliver innovative cyber solutions, ensure effective security, minimize organizational risk, and ensure mission outcomes for customers.

Prior to his work at Mandiant and Google, Ron served as the Director of the Department of Justice Security Operations Center (JSOC) where he led transformative efforts to redefine and restructure key information security and cyber defense operation capabilities. Ron also served as the Department’s Insider Threat Program Manager and liaison to the National Insider Threat Task Force. In previous roles, Ron built and led expert teams of cyber defense operators, incident responders, and red teams at several U.S. intelligence and defense department agencies. Ron began his career in the United States Air Force serving as an officer in the Information Warfare Aggressor Squadron. Ron holds an MS in Computer Information Systems from St. Mary's University and a BS in Electrical Engineering from Virginia Tech University.

THURSDAY LUNCH KEYNOTE

MARC RYLANDER, CHIEF COMMUNICATIONS OFFICER, GRPR PUBLIC AFFAIRS

MESSAGING WHEN YOUR HAIR IS ON FIRE: COMMUNICATING THROUGH A CRISIS

Marc Rylander guides clients with communications strategies, crisis communications implementation, communications policy development, press and media relations and training, and also leverages his many relationships in Austin and Washington to deliver winning government relations results. Prior to joining our team, he served as Director of Communications and Senior Advisor for the Office of the Attorney General of Texas.

Today he provides consultative communications leadership to leading names in the construction industry, higher education, municipal and state government entities in Texas and beyond, local school districts, church-related and nonprofit organizations, public safety departments, global manufacturing space, and the legal field.  Additionally, he publishes written materials and articles for clients, including opinion editorials, and has an extensive database of contacts in local, state, and national media outlets.

Communications is a generational calling for Marc.  His grandfather was an early broadcasting giant in Dallas/Ft. Worth who helped pioneer WFAA TV, after serving as a radio operator in World War II and then as a disc jockey at WFAA radio, before there was television in Texas.  Growing up around a newsroom instilled a love in Marc for the ever-changing world of headlines and a strong understanding of the critical and necessary role of the media and the people involved in that arena.  This upbringing provided him critical insight as he navigated communications efforts through some of the toughest events in Texas’ recent past, including: the aftermath of Hurricane Harvey, the complex Austin bombings, and tragedies at the Church at Sutherland Springs, Santa Fe High School, El Paso Wal Mart, and the 2016 attack on Dallas Police officers.  During these events, Marc led or coordinated with White House and other federal, state, and local public safety communications offices.  He has also led communications efforts for numerous state or local news events, including crises involving first responders, active shooters, issues at school districts, legal decisions, and broad array of other media-facing activities.

Marc holds a bachelor’s degree in telecommunications (broadcast journalism) from Baylor University and earned three master’s degrees. The first part of his communications service was spent in local churches, including ten years on the executive staff at Prestonwood Church in North Dallas.  He currently serves on the Board of Trustees of Houston Christian University, where he was Chairman of the Board in 2018-2019, and serves as President of the Board of the Celina Education Foundation in Celina, Texas.

Marc’s passion is his family, travel, and all things outdoors, especially hunting, fishing, grilling, and enjoying ample time at the lake.  He recently accomplished the feat of watching a baseball game in every Major League Baseball stadium in the game with his sons before they graduated high school.  As a fifth generation Dallasite, Marc has extensively studied the history of North Texas and has a collection of historical Dallas memorabilia second-to-none.

AGENDA

Download a copy of the Agenda HERE.

Wednesday, May 28, 2025
7:30 AM - 8:30 AM
Breakfast in Exhibit Hall
7:30 AM - 3:00 PM
Registration Open
8:30 AM
Welcome Remarks
9:00 AM - 10:00 AM
Wednesday Morning Keynote - Chris Weggeman
10:00 AM
Break in the Exhibit Hall
10:30 AM - 11:30 AM
Risk to the Nth-Party Degree
AI and the Future of Work: Transforming Legal Data Challenges & e-Discovery
AI-Driven Threats to Critical Infrastructure: Protecting the Systems That Matter Most
Building Cyber Resilience: Strategies for Thriving Amidst Digital Disruptions
From Learning to Defending – Fast-Tracking Cybersecurity Talent with Hands-On Training
11:30 AM
Wednesday Lunch Keynote - Dan Lohrmann
1:00 PM
Discovering Cyber and Operational Risk Through Network Visibility
How to Build a Strategic InfoSec Team: Elastic Security’s Journey
Securing Cyber Physical Systems Using AI Enabled Platforms
How to Show the Value of the Security Program
Balancing Innovation and Legacy: Modernizing Cybersecurity Infrastructure for a Hybrid Digital Landscape
2:00 PM
Mastering Risk and Compliance in the AI Era: The Five Cs Framework
Modernizing the Cybersecurity Infrastructure - Post-Quantum Encryption & NIST 2035 Mandate for Compliance
Mastering IT Inventory: Automating Discovery, Classification, and Risk Assessment in Large Federated Environments
From Grid to Ground: Securing Texas’ Critical Infrastructure Against Modern Cyber Threats
State of Texas: Journey to Modern Phishing-Resistant FIDO Authentication
3:00 PM - 3:30 PM
Break - Exhibit Hall Open
3:30 PM
The Intersection of Cybersecurity, Fraud, and Business Risk Management
Enhancing Mission Success Through Cloud Security and Visibility
Compliance Your End Users Love - A Modernization Story with Texas State University
Implementing an Effective Vendor Risk Management Program
Using Lessons Learned to Better Audit Incident Response - How to Get the Most Out of Plans, Processes and Tabletop Exercises
4:30 PM
Conference Ends for the Day
Thursday, May 29, 2025
7:30 AM - 8:30 AM
Breakfast in Exhibit Hall
7:30 AM - 4:30 PM
Registration Open
8:30 AM
Welcome Remarks
9:00 AM - 10:00 AM
Thursday Morning Keynote - Ron Bushar
10:00 AM - 10:30 AM
Break in the Exhibit Hall
10:30 AM
Advance Your Cyber-Resiliency: Dissecting A Modern Ransomware Attack
The Scourge of a Legacy Security Infrastructure
The Dark Web Explained: Worse Than You Think
DMARC Compliance - The Latest Updates and Requirements for 2025
Artificial Intelligence, Tech Revolutions, and the Future of Work Unleashed
11:30 AM - 12:50 PM
Thursday Lunch & Keynote - Marc Ryland
1:00 PM
CPRIT's Journey to a Modern Security Service Edge
Utilizing the SLCGP to Enhance Our Cybersecurity Program
How to Recover Active Directory When Every Second Counts
Overcoming Common Pitfalls in SOC Operations and Optimizing with AI
So You Think You Want To Be a CISO?
1:45 PM - 2:00 PM
Break - Exhibit Hall Open
2:00 PM
Gate Crashing: How Traditional Email Defenses Fail Against Modern Attacks
Optimizing Security Identity for a Modern Workforce
D-MARC, Get Set, Go
TBA
Cybersecurity Risk Management: Building a Process & Defining Your Risk Tolerance
3:00 PM
Conference Ends