Go Back Up

Secure Dallas

Cybersecurity Conference Agenda

  1. 9:00 AM 9:15 AM

    CONFERENCE WELCOME & OPENING REMARKS

    Secure Dallas 2025 Speaker Headshots - Jennifer Holmes UTD

     

    Dr. Jennifer Holmes

    Dean at UT Dallas

  2. 9:15 AM 9:45 AM

    Software Supply Chain Risk Management in the Enterprise

    Secure Dallas 2025 Speaker Headshots - Derek McCarthy NETRISE

     

    Derek McCarthy

    VP, Field Engineering at Netrise

     

    Today's enterprises are comprised of incredibly complex software stacks ranging from cloud-deployed applications, mobile device software and endpoint applications to embedded device firmware in our telecommunications, IoT, and OT systems.

    This software ecosystem becomes exponentially more complex when you take into account the supply chain aspect - what appears to be a single software package or application from a third party supplier is often comprised of hundreds of underlying dependencies, all with their own hidden risks and vulnerabilities.

    In this session, Derek will highlight the challenges that enterprises face as a result of the complex modern software ecosystem, as well as the importance of implementing people, processes, and tools to tackle such challenges.

  3. 9:45 AM 10:45 AM

    Hope for the Best, Plan for the Worst – Winning strategies to prevent cyber incidents in Texas

    MODERATOR: 

    Secure Dallas 2025 Speaker Headshots_Nate Howe UTF-1

     

    Nate Howe

    Chief Information Security Officer at UT Dallas

     

    PANELISTS: 

    Secure Dallas 2025 Speaker Headshots - Jennifer Holmes UTD

     

    Dr. Jennifer Holmes

    Dean at UT Dallas

     

    Secure Dallas 2025 Speaker Headshots_Dann Arce - UTD2

     

    Dr. Dann Arce

    Ashbel Smith Professor of Economics at UT Dallas

     

    Secure Dallas 2025 Speaker Headshots - Pengfei Zhang

     

    Dr. Pengfei Zhang

    Assistant Professor of Public Policy, Economics, and Cybersecurity at UT Dallas

     

    Secure Dallas 2025 Speaker Headshots_Marcelo Leal UTD

     

    Dr. Marcelo Leal

    Assistant Professor of Cyber Security, Technology, and Policy at UT Dallas

     

    This panel will consist of educators, researchers, and practitioners who will explore recent incidents and lessons learned that help Texas organizations reduce risk. They will discuss the role of regulations to drive change and opportunities for employers to develop a skilled workforce equipped fight cybercrime.

  4. 10:45 AM 11:15 AM

    EXPO HALL COFFEE BREAK

  5. 11:15 AM 11:45 AM

    The Rise of the Purple Team

    Secure Dallas 2025 Speaker Headshots - Chen Burshan Skyhawk Security

     

    Chen Burshan

    Chief Executive Officer at Skyhawk Security

     

    In 2024, 83% of organizations experienced at least one cloud security incident. The traditional cloud security model, based on CNAPPs with periodic penetration testing is falling short.  

    We'll consider the inherent challenges of the current approach, how to bring together security and cloud teams to improve collaboration in an ever-changing cloud environment. 

    This session will explore the critical need for a Purple Team paradigm and culture. We will discuss how merging the offensive expertise of the Red Team with the defensive capabilities of the Blue Team creates a unified force. By operating as an autonomous, continuous function, Purple Team provides real-time evaluation and validation of security controls. The constant feedback loop and shared goal of continuous improvement prove that in today's cloud-native world, the Red Team and Blue Team must merge to be truly effective. A purple team model transforms security from a reactive function into a preemptive, agile, and resilient strategy to reduce business risk. 

  6. 11:45 AM 12:15 PM

    The Past, Present, and Future of Security for AI

    Secure Dallas 2025 Speaker Headshots_Kasimir Schulz HLKasimir Schulz
    Director of Security Research at HiddenLayer

     

    As large language models and agentic systems become core infrastructure, their security challenges are rapidly evolving. This talk traces the shift from the early focus on adversarial examples to today's realities of prompt injection, data poisoning, and attacks against protective models, clearing up common misconceptions along the way. We explore how protecting LLMs and autonomous agents calls for new approaches to threat modeling, monitoring, and incident response while extending established security frameworks to address these emerging risks. Security for AI isn't about rewriting security from scratch but about turning existing security knowledge into the foundation for defending the next generation of intelligent systems.

  7. 12:15 PM 1:15 PM

    LUNCH BREAK & EXPO HALL

  8. 1:15 PM 2:00 PM

    From Adversary Tactics to Executive Outcomes in Months, Not Years

    Secure Dallas 2025 Speaker Headshots_HECTOR MONSEGURHector Monsegur
    Chief Research Officer at SafeHill

     


    In this keynote, world‑renowned cyber expert and former hacker Hector Monsegur makes the case that periodic penetration tests and annual assessments no longer match the tempo of modern attackers. When a report is delivered, the clock is already running—new CVEs emerge, credentials leak, cloud posture drifts, and identities become the shortest path to impact. 

    Hector outlines a pragmatic shift from point‑in‑time testing to the adoption of Continuous Threat Exposure Management (CTEM).  He argues that cybersecurity is no longer just about defense, it's about continuous visibility, proactive assessments, and timely mitigation.   This dynamic approach ensures that exposure management evolves alongside the threat landscape and business priorities.  

    Attendees will leave with an actionable blueprint for designing and implementing a CTEM program tailored to their digital infrastructure and business risk appetite.  The goal is to help security professionals turn noise into action.

  9. 2:00 PM 2:30 PM

    Keynote TBC

    TBC

  10. 2:30 PM 3:00 PM

    EXPO HALL & COFFEE BREAK

  11. 3:00 PM 4:00 PM

    Automation with Manners: When Should Software Act Before Humans — and How Do We Prove It's Safe?

    MODERATOR:
    Phillip-Wylie-ShowPhillip Wylie

    Founder and Host of The Phillip Wylie Show

     

     

    PANELISTS:
    Secure Dallas 2025 Speaker Headshots_Chipper Jones_Stellar CyberChipper Jones
    Regional Sales Director at Stellar Cyber

     

     

    Secure Dallas 2025 Speaker Headshots_BOB KRUSEBob Kruse
    Chief Executive Officer at Arms Cyber

     

    As automation becomes more embedded in security operations, the question isn’t just can we automate, but how much is too much? This panel explores where organizations are drawing the line between manual control and automated action.

    We’ll discuss how enterprises are safely deploying automation, how to build guardrails that prevent unintended consequences, and what it takes to prove these systems are secure, reliable, and accountable. 

  12. 4:00 PM 5:00 PM

    The New Cyberthreat Landscape

    Secure Dallas 2025 Speaker Headshots - Rachel Wilson

    Rachel Wilson

    Managing Director and Head of Cybersecurity of Wealth Management at Morgan Stanley and Former NSA Executive

     

    Cybersecurity “World Tour”:

    Rachel will describe the current cybersecurity threats facing companies and institutions from nation states like Russia, North Korea and Iran, from cyber organized crime syndicates, and from individual hackers looking to make money or create mayhem.

     

    Cybersecurity Threats in 2025:

    Rachel will define 2025 cyber threats as "The Three R's - Russia, Ransomware, and Resilience" and will explain the strategic importance and tactical implications of each.

     

    The New Threat - Artificial Intelligence:

    Rachel will walk us through the benefits and the detriments of artificial intelligence as it pertains to cybersecurity.

     

    Action Steps:

    Drawing from her experience at the NSA and in the financial sector, she will discuss what professionals need to be considering in the current cyber risk environment and describe the aspects of an effective corporate cyber resiliency strategy.

  13. 5:00 PM 5:15 PM

    CLOSING REMARKS

  14. 5:15 PM 7:30 PM

    COCKTAIL RECEPTION