We are thrilled to announce an exciting lineup of experts, luminaries, and leaders from across the cybersecurity ecosystem!
Keynote Speakers

Jen Easterly
CEO, RSAC; Former Director, Cybersecurity & Infrastructure Security Agency (CISA)

Rachel Wilson
Head of Wealth Management Data Security & Infrastructure Risk
Session Speakers

Kassandra Pierre Bedell
Founder, DYASPURA Digital
Bridging the Cyber Skills Gap: Intergenerational Mentorship as a Catalyst for Innovation

Buck Bell
Director, Global Security Strategy Office
AI-Driven Cybersecurity: Building Resilient Defense Systems in the Age of Artificial Intelligence

Jim Cerkovnik
Cybersecurity Researcher, Idaho National Laboratory
Understanding Volt Typhoon: Observations and Guidance for Critical Infrastructure Defenders

Rich Cominos
Investigator, CyberCX USA
Let Slip the Dogs of Cyberwar: Nation-State Tactics, Commercial Targets, and the New Front Lines

Norman Dorsch
Global Product Manager, X-Force, IBM
From Afterthought to Force Multiplier: Predictive Threat Intelligence in the Age of AI

Samuel Farnan
Controls System Cybersecurity
Analyst, Idaho National Laboratory
Understanding Volt Typhoon: Observations and Guidance for Critical Infrastructure Defenders

John Ford
CEO, Trifident Advisory Services
Crisis Management Preparation for Executives

Guillermo Francia
Professor & Director, University of West Florida
Agentic-AI for Cybersecurity Regulatory and NERC-CIP Standards Compliance

Blake Hearn
Federal Sales Engineer, Chainguard
The ABCs of Software Supply Chain Security

Deral Heiland
Principal Security Researcher (IoT)
Building A Comprehensive Internet of Things Testing Program

Felix Hernandez
CISO, Strategic Sentinels
Deep Fakes and Corporate Security

Jordan Howell
Assistant Professor, University of South Florida
Adversary-Centered Defense: Using Hacker-Sourced Intelligence to Safeguard Critical Infrastructure

Jiri Jirik
Director, Moraine Valley Community College
Interactive CMMC Training: Gamifying Cybersecurity Compliance Education

Cat Karow
Founder and CEO, ZoraSafe, Inc.
The Dark Web’s New Gold Rush: How AI Fuels Cybercrime as a Service (CaaS)

David Kim
AI & GRC Principal Consultant, Technology Management Corp.
How to Conduct an IT Security Risk Assessment of an AI Ecosystem

Palanivel Manhoharan
Lead CyberSecurity Architect, Humana
When Your Software Gets a Brain: The Looming Authorization Crisis in Agentic AI

Jim McGann
CMO, Index Engines
AI with Intention: Ransomware Detection and Trusted Data Recovery

Corey Monaghan
Special Agent Supervisor, Florida Department of Law Enforcement
The Dark Arts: Volatile Data Artifacts

Roberta O’Malley
Assistant Professor, University of South Florida
Examining the Complexity of Sextortion Crimes: Offender Modus Operandi and Victim Impacts

Bidemi Ologunde
Security Strategy Consultant & Criminal Intelligence Liaison
Deterrence by Design: Fusing AI, Post-Quantum Cryptography & Zero-Trust to Protect National Security in 2030

George Perera
Major-Commander, Miami-Dade Sherriff’s Office
Artificial Intelligence: Criminal Tradecraft, Investigation and Forensic Considerations

John Licato
Associate Professor, University of South Florida & CEO, Actualization.AI
How Bad Vendor Contracts Create Security Nightmares (And How To Fix Them)

John Riley
Impactifi Global
Panel Discussion: Post-Quantum Cryptography: Securing the Future Before It Arrives

Tad Schnaufer
Strategy and Research Manager, USF Global & National Security Institute
The Cyber Foxhole: Every Citizen holds a Position on the Next War’s Frontline

Michael Rogers
Managing Director of Resilience Advisory Services, MOXFIVE
From Breach to Boardroom: Translating Cyber Incidents into Executive Action

Steve Stasiukonis
Cybersecurity Professional, Secure Network Technologies
When Good AI Misbehaves – Cybercrime’s New Evil Genius

Mark Mahovlich
Vice President of Strategy & Execution, ICM Cyber
Cyber Predictions for the Rise of Artificial Intelligence & Quantum Computing

Jeremy Straub
Associate Professor, University of West Florida
AI and Education: Current State, Best Practices and the Future

Vanessa Toves
Microsoft 365 Solutions Architect, Druva
Secure Microsoft 365, Dynamics 365, and Entra ID Data Against Cyber Threats

Sasha Vanterpool
Senior Workforce Consultant, Skillrex.io
Moneyball Meets Mobility: Data-Driven Strategies for Building Future-Skills Ready Cybersecurity Teams

Travis Weathers
Co-Founder, Mayweather Group, LLC & VTEM Labs, Inc
Breaching the Unbreachable: Stories from the Field

Allen Westley
Director, Cyber Intelligence, L3Harris Technologies
The Battle for the Mind: AI, Cognitive Exploitation, and the New National Security Frontier

Gene Yoo
CEO, Resecurity
Offensive Defense – Leveraging Dark Web Intelligence for Proactive Cyber Threat Hunting

George Zimmermann
Information Security Manager, Northwest Regional Data Center, FSU
Cybersecurity Incident Response Resources for Organizations with Limited Budgets

