Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.
Event Date |
Wed May 28 MDT - Fri May 30 MDT (14 days ago)
In your timezone (EDT): Wed May 28 2:00am - Fri May 30 2:00am |
Location |
Colorado Convention Center
700 14th St, Denver, CO 80202, USA |
Region | Americas |
This is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels, this event provides the perfect blend of education, networking and opportunities that are critical to success in today’s economy and security climate.
Why Attend?
What's new at this event? Plenty! We're unveiling a host of fresh experiences that will engage even our most seasoned attendees.
Colorado Sips and Savors Reception:
• Indulge in local flavors and network with fellow attendees in the exhibit hall.
Authors Alley:
• Visit with some of your favorite industry authors at appointed times throughout the conference.
Birds of a Feather Lunchtime Gatherings:
• Connect with peers over lunch to discuss some of the most pressing industry challenges.
Lockpick Outpost:
• A unique and fun hands-on learning and networking opportunity.
This event will, of course, continue to deliver:
• A stellar lineup of keynote speakers
• Engaging sessions led by industry experts
• Specialized workshops
• Earn up to 7 CPEs per day
2025 Speakers
Eric Agan
Corporate Espionage Detection and Prevention, ISC2 Kansas City Chapter
Dirk Anderson
Updates to the CryptoCurrency Security Standard (CCSS) v. 9, Imagine Crypto
Alison Atkins
Who’s Left Holding the Stick? Personal Liability for Cybersecurity Professionals
Eric Avigdor
Generative AI: The Worst Form of Shadow IT, Votiro
Jon Baldwin
CISO, Cresset Capital
Aaron Baldwin
Flipping the Script: From the Trenches to the C-Suite - Panel, Gensler
Yaamini Barathi Mohan
Revolutionizing Cloud Security: How GenAI is Changing the Game, Dell Technologies
Deborah Blyth
Executive Strategist, CrowdStrike
Kris Boesch
Afternoon Keynote Session - Kris Boesch - Author of Culture Works: How to Create Happiness in the Workplace
Derek Booth
How to partner with Federal Law Enforcement for Cybersecurity, U.S. Secret Service
Michael Borgia
Partner, Davis Wright Tremaine LLP
Blake Boykin
Maintaining Good CISO/Vendor relationships, Trend Micro
Jim Broome
President, DirectDefense, Inc
Is Cybersecurity a Blue-Collar Job? Exploring Alternative Pathways to Strengthen Our Industry
Cody Burrows
Women In Security - Afternoon Session
Chelsea Canada
Trends at the Capitol – How State Legislatures are Regulating and Using AI, National Conference of State Legislatures
Sabrina Caplis
Flipping the Script: From the Trenches to the C-Suite - Panel, RockCyber
Rupesh Chokshi
The Hidden Dangers of APIs: Key Insights and Strategies to Safeguard Your Business, Akamai
Adam Chou
CISO Summit - Destination Leadership: Mapping the Path Forward, Adobe
Christopher Clark
Cybersecurity Skills Gap Fallacies: What We Often Get Wrong And How To Fix It, Documoto
William Clark
Program Principal, NCSL
Trends at the Capitol – How State Legislatures are Regulating and Using AI
Ryan Clarque
Generative AI: The Worst Form of Shadow IT
Matt Closson
How to partner with Federal Law Enforcement for Cybersecurity, Homeland Security Investigations
Thomas Codevilla
Partner, SK&S Law Group LLP
Tim Coogan
Director and CISO Cybersecurity, Regional Transportation District
Ryan Coryell
Flipping the Script: From the Trenches to the C-Suite - Panel
Stephen Coury
Former CISO (Retired), City and County of Denver (Ret)
Peter DeFinis
Data Security, Privacy and Trust Walk Into A Bar..., TechForward IT LLC
Theresa DeGroote
Director of Membership/Women in Security, Denver ISSA
Stewart Deken
Manager, Lead Digital Forensics Investigator, RubinBrown
Suril Desai
When the IAM admin is the threat: tales from battling with insiders, Acalvio Technologies
Carlin Dornbusch
President, American Cyber Security Management
Sloane Dreyer
Associate Attorney, Holland & Hart LLP
Erik Dullea
Attorney, Husch Blackwell LLP
Ken Dunham
Cyber CISO Marksmanship: Hitting the Mark in Cyber Security Leadership
Todd Felker
Director, Healthcare Industry Business Solution and Strategy, CrowdStrike
Cher Fox
President, Fox Consulting
Data Security, Privacy and Trust Walk Into A Bar...
Will Greenblatt
Leadership Presence | Get promoted, win work, and inspire teams with confident speaking skills
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4, Inc
Patti Hallock
Investigations Facilitator, Trace3
Danika Hannon
Cybersecurity Master's Student, Quantum Strategy Institute
Laura Harder
Data Security, Privacy and Trust Walk Into A Bar..., Kaiser Permanente
Paul Herbka
Vice President, American Cyber Security Management
Jonathan Anthony Hernandez
Cybersecurity Specialist, Nationwide Children Hospital
Scott Hogg
CTO, Hogg Networking
Janelle Hsia
AI, Privacy, and Security: Striking the Perfect Balance, Privacy SWAN Consulting - Principal
Justin Hutchens
CISO Summit - Destination Leadership: Mapping the Path Forward
Christian Hyatt
ISO 42001: Inside the World's First Artificial Intelligence Certification, risk3sixty - CEO and Co-Founder
Justin Jetton
Weeding Out the Noise: Building Out an Effective CTI Process, Veeva Systems
James Johnson
Cyber CISO Marksmanship: Hitting the Mark in Cyber Security Leadership, Holland & Hart - CIO
Kim Jones
Morning Keynote - Kim Jones, "The 21st Century CISO (version 2.0)", High Wire Networks - Chief Information Security Officer
Mike Jones
Afternoon Reception and Keynote Session - Mike Jones - The Haunted Hacker
Nalini Kaplan
Privacy Without Borders: A Practical Roadmap to Harmonizing Healthcare and Privacy Regulations, American Cyber Security Management - Principal
Audrey Kessler
Women In Security - Morning Session, CoBank - Investigations Facilitator
Hoyt Kesterson
The Effect of Quantum Computing on Digital Signatures, CNC Consulting - Senior Security & Risk Architect
Indus Khaitan
Orphan Accounts and Open Doors: Securing Disconnected Apps, Redblock AI
Alex Kimata
Legal Minds on AI: Bridging the Gap Between Law and Implementation, Holland & Hart LLP - Associate
Gaelle Koanda
Cloud security audit a Step-by-step approach, Bae space and mission system - Cybersecurity professional
Tabatha Kossman
Women In Security - Morning Session
How I Used AI to Crush CTF Challenges and What I Learned Along the Way, Investigations Facilitator
Brian Krebs
Opening Keynote - Brian Krebs, Investigative Journalist & Cybersecurity Expert
Kyriakos Lambros
Preparing for AI Governance in Colorado’s Emerging Regulatory Environment
From Chaos to Control: Merging AI Strategy with Robust Governance, RockCyber, LLC - CEO & Founder
Ross Lazerowitz
Evolving Social Engineering Threats: From Traditional Tactics to AI-Powered Voice and Video Scams, Mirage Security
Jason Lewkowicz
Who’s Left Holding the Stick? Personal Liability for Cybersecurity Professionals, Ernst & Young
Steve Linn
Practice makes Perfect - Table Top Exercise for a Ransomware Incident
Erin Locker
Privacy Considerations of Automated Decision-Making in the Age of AI
Kamal Maheshwari
Data Security, Privacy and Trust Walk Into A Bar...
Danny Manimbo
Implementing and Operating an AI Management System with a Compliance Perspective, Schellman - Principal
Charlie Marmon
Defending against Cyber Attacks: A Risk Management Approach
How to partner with Federal Law Enforcement for Cybersecurity, CISA - Cybersecurity State Coordinator
Merry Marwig
Your Car's Hidden Passengers: Companies, Cops, and Criminals. Retake Control, Privacy4Cars
Joe McCallister
Unstuck in the Middle - I made it into Cyber, now what?
Scott McCandless
Flipping the Script: From the Trenches to the C-Suite - Panel
Maintaining Good CISO/Vendor relationships
Joseph McComb
Cyber CISO Marksmanship: Hitting the Mark in Cyber Security Leadership
Maintaining Good CISO/Vendor relationships, Holland & Hart, LLP
Keyanne McCray
Risk Governance Roundtable
Heidi McDonald
Women In Security - Morning Session, Valkyries' Information Security - Investigations Facilitator
Chris McLaughlin
Seven Steps to a Sustainable OT Security Program, Johns Manville - CISO, Vice President - Denver Chapter
Chase Millea
Privacy Considerations of Automated Decision-Making in the Age of AI, KO Law PC
Rich Mogull
Beyond the SOC: Scaling Response with the Incident Command System, Securosis/FireMon
Liz Morton
CISO Summit - Destination Leadership: Mapping the Path Forward, Axonius
Jason Myszkiewicz
How to partner with Federal Law Enforcement for Cybersecurity
Merlin Namuth CISSP, GCFA, GCIH, PMP
Panic, Triage, Repeat: The Art of Cyber Crisis Management, City and County of Denver - Chief Information Security Officer
David Navetta
Data with Borders: the DOJ's Final Sensitive Personal Information Access Rule
Nicole Nguyen
AI, Privacy, and Security: Striking the Perfect Balance
George Nsude
Cloud security audit a Step-by-step approach, Ritter Communications
Mike Pedrick
Your Car's Hidden Passengers: Companies, Cops, and Criminals. Retake Control
Josh Peltz
CISO Summit - Destination Leadership: Mapping the Path Forward, Zero Networks
Daniel Pietragallo
Preparing for AI Governance in Colorado’s Emerging Regulatory Environment
Justin Pollard
Your Car's Hidden Passengers: Companies, Cops, and Criminals. Retake Control
Gopi Ramamoorthy
Orphan Accounts and Open Doors: Securing Disconnected Apps, Symmetry
Brian Reimer
Maintaining Good CISO/Vendor relationships, Cato Networks
Richard Reinders
Digital Assets - securing keys, wallets and infrastructure (and what if it goes wrong)
Brad Rhodes
Volt and Salt Typhoon Living-off-the-Land (LOTL): The Rise of LOLBins, Department of Energy / Energy Threat Analysis Center
Shelley Rossell
Women In Security - Morning Session, Solventum - Cloud Security Architect
Rob Rudloff
Legal Rights After a Business Email Compromise -- facing reality when prevention fails, RubinBrown LLP - Partner, Cyber Security Services
Mike Ruehmkorff
Explore a new era of SecOps and NG SIEM built on AI with blazing fast performance, City of Hope - System Chief Information Security Officer
Ben Ryder
RACI in InfoSec - How understanding role responsibility and accountability can make everything better, The Anschutz Corporation - Security Program Manager
Eric Sampson
Real-World Lessons from Compliance Failures, Schellman
Rohit Satpathy
So, you’ve been hacked: Jurassic Park Edition, The PC Security Channel - Founder and CEO
Craig Savage
Protecting the unpatchable - what do you do when you can't apply a security patch?, Spinnaker Support - Head of Enterprise Security
Wayne Schepens
Generative AI: The Worst Form of Shadow IT, Cyber Risk Alliance - Chief Cyber Market Analyst
Josh Shepard
Observations in Obfuscation - Phishing Link Obfuscation Techniques, Radicl
Scott Sherman
Security is no longer a Secret : Blame YouTube
Joe Sigman
Implementing and Operating an AI Management System with a Compliance Perspective, Schellman
Craig Stanland
How I Got Caught: A Deep Dive Into an 800K Fraud, Self-Employed - Reinvention Architect
David Stauss
Hot Topics in Privacy Law, Husch Blackwell LLP - Partner
Greg Sternberg
You're not as worried about deep fakes as you should be., Evotek - Security Architect
Brian Sudis
Leadership, Cybersecurity & the CISO - Wish I Had Known ..., American Cyber Security Management - vCISO
Larisa Thomas
Privacy Without Borders: A Practical Roadmap to Harmonizing Healthcare and Privacy Regulations, NOX HEALTH - VP & CISO
Chris Tuzeneu
Security on a Budget: Augmenting Your Program with Open Source Solutions, CivITas Bank Solutions
Frank Victory
Beyond the Hype: Leveraging MITRE Caldera for Practical Risk Assessment, Denver OWASP - Vice President
Blaise Wabo
SOC 1 and SOC 2 Attestation Reports: Ensuring Trust and Compliance, A-LIGN - Healthcare Director
Bob Wall
Illuminating the Dark Corners of AI: Exploiting Shadow Data in AI Models and Embeddings, IronCore Labs, Inc
Jeff Whitney
Legal Rights After a Business Email Compromise -- facing reality when prevention fails, Husch Blackwell LLP
Keyaan Williams
Risk Governance Roundtable, CLASS-LLC - Managing Director
Steve Winterfeld
How to partner with Federal Law Enforcement for Cybersecurity, CVA - Advisory CISO
Karen Worstell
Preparing for AI Governance in Colorado’s Emerging Regulatory Environment, W Risk Group LLC
Gina Yacone
Breaking the Illusion: Leading Through Security and Innovation in a Disruptive Era, CISO Summit - Destination Leadership: Mapping the Path Forward
David Zetoony
Hot Topics in Privacy Law, Greenberg Traurig - Shareholder
2025 Sponsors
PREMIER SPONSOR:
• Evotek
DIAMOND SPONSORS:
• Google Cloud Security
PLATINUM SPONSORS:
• Auditboard
• Black Hills Information Security
• Cohesity
• Contrast
• Fastly
• illumio
• infoblox 800 x 450.png
• linford & co llp
• PDI Technologies
• red canary
• Richey May
• sailpoint
• Trend
GOLD SPONSORS:
• Axonius
• Comcast Business
• Cyberhaven
• InvokeSec
• Menlo Security
• Meedling Worldwide
• Ping 800 x 450.png
• proofpoint
• Rapid7
• risk3sixty
• tenable
• Virtual Armour
• Votiro
SILVER SPONSORS:
• ANM
• schellman
• Sentinel One
• Tevora