Download a copy of the Agenda HERE.

Download a copy of the Exhibitors, Sponsors & EXPO Floor Plan HERE.

Download a copy of the Product Demos HERE.

AGENDA

WEDNESDAY MORNING KEYNOTE

TEXAS STATE SENATOR TAN PARKER

CYBERSECURITY DISCUSSION

Tan Parker is a businessman, who grew up in North Texas working in his family’s restaurants while volunteering in his community. He married his college sweetheart, Beth, and they moved to Flower Mound, raising their daughters, Lauren and Ashley. While family comes first, Tan considers working for the betterment of Texas the highest honor of his professional life.

Previously serving in the Texas House, Tan held leading committee roles on policy matters vital to our state. His leadership was instrumental in the unanimous election by his colleagues as chair of the House Republican Caucus during the 84th and 85th legislative sessions.

Tan Parker is a businessman, who grew up in North Texas working in his family’s restaurants while volunteering in his community. He married his college sweetheart, Beth, and they moved to Flower Mound, raising their daughters, Lauren and Ashley. While family comes first, Tan considers working for the betterment of Texas the highest honor of his professional life.

Previously serving in the Texas House, Tan held leading committee roles on policy matters vital to our state. His leadership was instrumental in the unanimous election by his colleagues as chair of the House Republican Caucus during the 84th and 85th legislative sessions.

Tan’s legislative success touches a broad range of issues facing Texans and serves as a reflection of open dialogue with his constituency. His legislative accomplishments represent his extensive work fostering Texas’ economic vitality and protecting our most vulnerable.

Tan graduated from the University of Dallas and earned a Master’s degree from the London School of Economics before building a distinguished private sector career in technology and private equity. He also created the book, Making Government Work.

The bedrock of his service is exemplified through passionate advocacy for community and fighting for common-sense, conservative policies that strengthen Texas’ prosperity.

WEDNESDAY LUNCH KEYNOTE

DAVID P. LUBER, LUBER CYBER LLC

WHEN THE MACHINES FIGHT BACK: THE NEW OFFENSIVE-DEFENSIVE CYBER WAR

The rules of engagement in cyberspace have changed. Autonomous offensive AI is no longer a theoretical threat horizon; it is an operational reality rewriting the speed, scale, and sophistication of attacks against government networks right now. AI-driven adversaries are scanning, probing, and exploiting vulnerabilities in minutes, not days — faster than any human-speed security operation center can detect, triage, and respond.

In this keynote, David Luber — former Director of Cybersecurity at the National Security Agency — brings a rare, career-forged perspective to one of the most consequential shifts in the history of cyber defense. Drawing on decades at the leading edge of national-level cybersecurity operations, Dave will walk through what autonomous offensive AI actually looks like in the wild: how AI-driven tools are being weaponized to discover vulnerabilities at scale, chain exploits autonomously, and adapt in real time to evade even sophisticated defenses. He will examine what this tectonic shift means for state and local government agencies — most of which were architected to defend against human-paced attackers in a fundamentally different threat era.

But this session doesn't stop at the threat picture. The core of this keynote is practical and actionable: what does a modern AI-augmented defensive posture actually look like, and what can government security leaders do right now? Dave will also share hard-won lessons from a career spanning some of the most consequential moments in U.S. cyber history — offered here for the benefit of the Texas public sector security community.

Attendees will leave with a sharper understanding of the machine-speed battlefield, a clearer view of where defensive gaps exist, and concrete steps for building resilience before the next campaign arrives.

The machines are already fighting. The question is whether your defenses are ready.

David P. Luber [Luber Cyber LLC, Mt Airy MD] is a longtime U.S. national security and cyber operations leader with more than three decades of service at the National Security Agency and U.S. Cyber Command. He most recently served as Director of the NSA’s Cybersecurity Directorate, where he led national‑level efforts to protect U.S. national security systems and critical infrastructure. Earlier, he was the Executive Director of U.S. Cyber Command—the organization’s highest‑ranking civilian—overseeing more than 12,000 personnel and 133 Cyber Mission Force teams. His career includes senior roles such as Director of NSA Colorado, Chief of the Remote Operations Center within Tailored Access Operations, and Program Director in the Office of the Secretary of Defense for Intelligence. Luber’s contributions have earned him numerous top civilian service awards across the intelligence and defense communities.

THURSDAY MORNING KEYNOTE

DAN LOHRMANN, FIELD CHIEF INFORMATION SECURITY OFFICER (CISO), PRESIDIO

TRUST IS THE NEW BATTLEGROUND: CYBER DEFENSE FROM Y2K TO AGENTIC AI

Erica Ford picture

The 21st century has delivered remarkable innovation—from smartphones to generative AI—while introducing new risks, from Y2K-era legacy constraints to today’s AI-enabled deception and "hallucinations."

This session traces how cybersecurity in state and local government has evolved across this millennium: the inflection points that changed the threat landscape, the practices that proved durable, and the hard lessons learned while protecting critical infrastructure, services, data, and residents.

It then looks ahead to what’s next—zero trust, identity-first security, and the rise of agentic AI—so attendees leave with practical guidance they can apply immediately: what to prioritize, what to modernize, and how to communicate risk and investment needs to leadership.

Grounded in candid, real-world stories from the front lines, the presentation is delivered through the lens of a former State Government CISO, three-time author, and award-winning weekly blogger—bringing a fresh, actionable perspective for public-sector cyber leaders and practitioners.

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year from SC Magazine, Public Official of the Year from Governing Magazine and Computerworld Premier 100 IT Leader.

Lohrmann currently serves as the Field CISO, Public Sector for Presidio, a global digital services and solutions provider accelerating business transformation through secured technology moderization. Lohrmann leads cybersecurity advisory services for public sector clients at Presidio. Working with global CxOs and partners, Dan advises clients on cybersecurity best practices and solutions. He previously served as the Chief Security Officer (CSO) and Chief Strategisst for Secuirty Mentor, Inc., a security awareness and training company.

Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Dan has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and non- profit institutions.

Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility.

Lohrmann is the co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions, published by Wiley in November, 2021. His co-author is Shamane Tan, and cybersecurity expert residing in Australia. Dan is also the author of two earlier books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow.

Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana. Dan also serves as a Senior Fellow at the Center for Digital Government.

THURSDAY LUNCH KEYNOTE

CISO PANEL DISCUSSION

 

Michael Fitch is a resident of the Austin area and has more than 30 years of experience spanning enterprise cybersecurity and IT services for customers in federal, state & local government. He brings an understanding of the unique needs of state agencies and the requirement for strong communication and collaboration to achieve success. Mr. Fitch holds a master’s degree in Cybersecurity and Information Assurance (MSCIA), a bachelor’s degree in business administration, and multiple professional certifications, including PgMP, ITIL 4 Strategic Leader and Managing Professional, CISSP, CISSP-ISSMP, HCISPP, CCSP, C-CISO, CEH, and GSLC.

Aaron Thalman is an accomplished cybersecurity leader with over 27 years of experience in the technology field, including 15 years dedicated to cybersecurity within higher education and K–12 environments. He holds a Bachelor’s degree in Computer Information Technology and maintains industry-recognized certifications, including CISSP, CCNA, and additional credentials focused on network penetration testing and incident response.
Aaron’s expertise has been highlighted in multiple industry case studies and most recently featured in EdTech magazine. Throughout his career, he has successfully built and led security programs across both higher education institutions and K–12 school districts, bringing deep, hands-on experience in addressing the unique challenges of resource-constrained environments.
At IDEA Public Schools, Aaron leads enterprise security strategy, incident response, risk management, operational security, and security awareness initiatives, safeguarding the data of thousands of students and staff.

Jeremiah Clifton is a senior cybersecurity and digital risk leader with more than fifteen years of experience leading enterprise security programs in complex public-sector environments.

He currently serves as the Interim Chief Information Security Officer (CISO) for the City of Austin, where he leads the enterprise information security program, aligning security, privacy, and digital risk to support citywide technology strategy and resilience.

Previously, he held senior cybersecurity leadership roles at NASA's Johnson Space Center, supporting mission-critical systems for human spaceflight and research.

Jeremiah holds a Chief Risk Officer (CRO) Certificate from Carnegie Mellon University and maintains a broad portfolio of advanced certifications across cybersecurity, privacy, audit, and enterprise risk management.

Steven Pryor is the Chief Information Security Officer (CISO) for the Texas Department of Transportation (TxDOT), leading statewide efforts to secure Texas’s critical transportation infrastructure. He oversees 24/7 cybersecurity operations, ensures TxDOT systems are built securely, and collaborates with public and private partners to provide trusted, resilient solutions.

With 17 years of cybersecurity experience across the U.S. Air Force, U.S. Department of State, and multiple Texas agencies, Steven brings deep expertise in risk management, assessment, and security governance. Prior to joining TxDOT, he served as a Cybersecurity Assessor for the Department of State and Director of Governance, Risk, and Compliance for Texas Health and Human Services.

 

AGENDA

Download a copy of the Agenda HERE.

Wednesday, May 20, 2026, 7:30 AM - 8:30 AM
7:30 AM - 8:30 AM
Breakfast in Exhibit Hall
Wednesday, May 20, 2026, 8:30 AM
8:30 AM
Welcome Remarks
Wednesday, May 20, 2026, 9:00 AM - 10:00 AM
9:00 AM - 10:00 AM
Wednesday Morning Keynote
Wednesday, May 20, 2026, 10:00 AM
10:00 AM
Break in the Exhibit Hall
Wednesday, May 20, 2026, 10:30 AM - 11:15 AM
10:30 AM - 11:15 AM
Beyond the Backup: Building True Cyber Resilience for Government Identity Systems
From Flat Networks to Zero Trust: Using Microsegmentation to Strengthen CJIS Compliance
The Magnificent Seven: What the Most Effective Cybersecurity Programs Get Right
Five Practical Steps to Strengthen Cyber Resilience
Modern Data Security Data Leakage, Data Governance, and Behavioral Insights
Wednesday, May 20, 2026, 11:30 AM
11:30 AM
Wednesday Lunch Keynote - Dave Luber
Wednesday, May 20, 2026, 1:00 PM - 1:45 PM
1:00 PM - 1:45 PM
Advancing IT Resilience: Building a Robust Cybersecurity Framework
Fostering a Security-first Culture
Future-Proofing Your Cybersecurity Workforce: Building Fundamental Capabilities That Last
UT RSOC: Innovating Security Services for Texas
Closing the Gap: How Strong Cybersecurity Controls Supercharge Fraud Detection
Wednesday, May 20, 2026, 2:00 PM - 2:45 PM
2:00 PM - 2:45 PM
Integrating Identity Security with the SOC A Critical Move for Modern Security Teams
Building and Preparing Crypto-Agility for the Future
From Tech Talk to Business Results: Rosetta Stone for ISOs to Executives
The Power of Seeing Risk: Using SLCGP Tools to Transform Cybersecurity Strategy
Smarter Government: How OAG is Leveraging AI while Protecting Agency and Constituent Data
Wednesday, May 20, 2026, 3:00 PM - 3:30 PM
3:00 PM - 3:30 PM
Break - Exhibit Hall Open
Wednesday, May 20, 2026, 3:30 PM - 4:30 PM
3:30 PM - 4:30 PM
The ASU RSOC Program: Creating Cyber Warriors to Face the Future
Who’s Watching the Watchers? Navigating the Complexity of LLM and Agentic Observability
Managing Cloud Vendor Risk at Scale: A Statewide Shared Assessment Model for Texas
Third Party Identity and Access Management
Securing the Quantum Era: Modern Cryptography for Modern Threats
Thursday, May 21, 2026, 7:30 AM - 8:30 AM
7:30 AM - 8:30 AM
Breakfast in Exhibit Hall
Thursday, May 21, 2026, 8:30 AM
8:30 AM
Welcome Remarks
Thursday, May 21, 2026, 9:00 AM - 10:00 AM
9:00 AM - 10:00 AM
Thursday Morning Keynote - DAN LOHRMANN
Thursday, May 21, 2026, 10:00 AM - 10:30 AM
10:00 AM - 10:30 AM
Break in the Exhibit Hall
Thursday, May 21, 2026, 10:30 AM - 11:15 AM
10:30 AM - 11:15 AM
How Easy It Is To Defeat Most MFA and How To Defend
From “One Day” to “Day One” – A GLO Password-less Story
The Autonomous Shield: Redefining Statewide Cyber Defense with Agentic AI
The Human Factor: Quantifying Human Risk
Strengthening The Great State of Texas: Consolidated Security Platforms and AI
Thursday, May 21, 2026, 11:30 AM - 12:50 PM
11:30 AM - 12:50 PM
Thursday Lunch & Keynote: CISO PANEL
Thursday, May 21, 2026, 1:00 PM - 1:45 PM
1:00 PM - 1:45 PM
Implementing Windows 11 Intune CIS Benchmarks
Identifying, Prioritizing, and Assessing High Value Assets (HVAs)
Detecting and Disrupting AI Enabled Threats: Deepfakes, Phishing, and Emerging Social Engineering Risks
The State of AI in GovTech: From Adoption to Accountable Governance
How to become a CISO
Thursday, May 21, 2026, 1:45 PM - 2:00 PM
1:45 PM - 2:00 PM
Break - Exhibit Hall Open
Thursday, May 21, 2026, 2:00 PM - 2:45 PM
2:00 PM - 2:45 PM
Leveraging the Power of AI While Keeping Your Data Safe
Modernizing for Resilience: How Public Sector IT Leaders Reduce Risk and Improve Continuity
Mind Hacking Live: How Social Engineers Use Tech to Exploit Your Humanity
Any Data, Anywhere: Secure Mobility and Governance Across Edge, Datacenter, and Cloud
From Visibility to Vigilance: Turning Network Insight into Actionable Cyber Defense