Venue
Colorado Convention Center
Colorado Convention Center, 700 14th St, Denver, CO 80202, USA

What is Qwoted?

Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.

Event Date Wed May 28 MDT - Fri May 30 MDT (14 days ago)
In your timezone (EDT): Wed May 28 2:00am - Fri May 30 2:00am
Location Colorado Convention Center
700 14th St, Denver, CO 80202, USA
Region Americas
Details

This is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels, this event provides the perfect blend of education, networking and opportunities that are critical to success in today’s economy and security climate.

Why Attend?
What's new at this event? Plenty! We're unveiling a host of fresh experiences that will engage even our most seasoned attendees.

Colorado Sips and Savors Reception:
• Indulge in local flavors and network with fellow attendees in the exhibit hall.

Authors Alley:
• Visit with some of your favorite industry authors at appointed times throughout the conference.

Birds of a Feather Lunchtime Gatherings:
• Connect with peers over lunch to discuss some of the most pressing industry challenges.

Lockpick Outpost:
• A unique and fun hands-on learning and networking opportunity.

This event will, of course, continue to deliver:
• A stellar lineup of keynote speakers
• Engaging sessions led by industry experts
• Specialized workshops
• Earn up to 7 CPEs per day

Speakers

2025 Speakers

Eric Agan
Corporate Espionage Detection and Prevention, ISC2 Kansas City Chapter

Dirk Anderson
Updates to the CryptoCurrency Security Standard (CCSS) v. 9, Imagine Crypto

Alison Atkins
Who’s Left Holding the Stick? Personal Liability for Cybersecurity Professionals

Eric Avigdor
Generative AI: The Worst Form of Shadow IT, Votiro

Jon Baldwin
CISO, Cresset Capital

Aaron Baldwin
Flipping the Script: From the Trenches to the C-Suite - Panel, Gensler

Yaamini Barathi Mohan
Revolutionizing Cloud Security: How GenAI is Changing the Game, Dell Technologies

Deborah Blyth
Executive Strategist, CrowdStrike

Kris Boesch
Afternoon Keynote Session - Kris Boesch - Author of Culture Works: How to Create Happiness in the Workplace

Derek Booth
How to partner with Federal Law Enforcement for Cybersecurity, U.S. Secret Service

Michael Borgia
Partner, Davis Wright Tremaine LLP

Blake Boykin
Maintaining Good CISO/Vendor relationships, Trend Micro

Jim Broome
President, DirectDefense, Inc
Is Cybersecurity a Blue-Collar Job? Exploring Alternative Pathways to Strengthen Our Industry

Cody Burrows
Women In Security - Afternoon Session

Chelsea Canada
Trends at the Capitol – How State Legislatures are Regulating and Using AI, National Conference of State Legislatures

Sabrina Caplis
Flipping the Script: From the Trenches to the C-Suite - Panel, RockCyber

Rupesh Chokshi
The Hidden Dangers of APIs: Key Insights and Strategies to Safeguard Your Business, Akamai

Adam Chou
CISO Summit - Destination Leadership: Mapping the Path Forward, Adobe

Christopher Clark
Cybersecurity Skills Gap Fallacies: What We Often Get Wrong And How To Fix It, Documoto

William Clark
Program Principal, NCSL
Trends at the Capitol – How State Legislatures are Regulating and Using AI

Ryan Clarque
Generative AI: The Worst Form of Shadow IT

Matt Closson
How to partner with Federal Law Enforcement for Cybersecurity, Homeland Security Investigations

Thomas Codevilla
Partner, SK&S Law Group LLP

Tim Coogan
Director and CISO Cybersecurity, Regional Transportation District

Ryan Coryell
Flipping the Script: From the Trenches to the C-Suite - Panel

Stephen Coury
Former CISO (Retired), City and County of Denver (Ret)

Peter DeFinis
Data Security, Privacy and Trust Walk Into A Bar..., TechForward IT LLC

Theresa DeGroote
Director of Membership/Women in Security, Denver ISSA

Stewart Deken
Manager, Lead Digital Forensics Investigator, RubinBrown

Suril Desai
When the IAM admin is the threat: tales from battling with insiders, Acalvio Technologies

Carlin Dornbusch
President, American Cyber Security Management

Sloane Dreyer
Associate Attorney, Holland & Hart LLP

Erik Dullea
Attorney, Husch Blackwell LLP

Ken Dunham
Cyber CISO Marksmanship: Hitting the Mark in Cyber Security Leadership

Todd Felker
Director, Healthcare Industry Business Solution and Strategy, CrowdStrike

Cher Fox
President, Fox Consulting
Data Security, Privacy and Trust Walk Into A Bar...

Will Greenblatt
Leadership Presence | Get promoted, win work, and inspire teams with confident speaking skills

Roger Grimes
Data-Driven Defense Evangelist, KnowBe4, Inc

Patti Hallock
Investigations Facilitator, Trace3

Danika Hannon
Cybersecurity Master's Student, Quantum Strategy Institute

Laura Harder
Data Security, Privacy and Trust Walk Into A Bar..., Kaiser Permanente

Paul Herbka
Vice President, American Cyber Security Management

Jonathan Anthony Hernandez
Cybersecurity Specialist, Nationwide Children Hospital

Scott Hogg
CTO, Hogg Networking

Janelle Hsia
AI, Privacy, and Security: Striking the Perfect Balance, Privacy SWAN Consulting - Principal

Justin Hutchens
CISO Summit - Destination Leadership: Mapping the Path Forward

Christian Hyatt
ISO 42001: Inside the World's First Artificial Intelligence Certification, risk3sixty - CEO and Co-Founder

Justin Jetton
Weeding Out the Noise: Building Out an Effective CTI Process, Veeva Systems

James Johnson
Cyber CISO Marksmanship: Hitting the Mark in Cyber Security Leadership, Holland & Hart - CIO

Kim Jones
Morning Keynote - Kim Jones, "The 21st Century CISO (version 2.0)", High Wire Networks - Chief Information Security Officer

Mike Jones
Afternoon Reception and Keynote Session - Mike Jones - The Haunted Hacker

Nalini Kaplan
Privacy Without Borders: A Practical Roadmap to Harmonizing Healthcare and Privacy Regulations, American Cyber Security Management - Principal

Audrey Kessler
Women In Security - Morning Session, CoBank - Investigations Facilitator

Hoyt Kesterson
The Effect of Quantum Computing on Digital Signatures, CNC Consulting - Senior Security & Risk Architect

Indus Khaitan
Orphan Accounts and Open Doors: Securing Disconnected Apps, Redblock AI

Alex Kimata
Legal Minds on AI: Bridging the Gap Between Law and Implementation, Holland & Hart LLP - Associate

Gaelle Koanda
Cloud security audit a Step-by-step approach, Bae space and mission system - Cybersecurity professional

Tabatha Kossman
Women In Security - Morning Session
How I Used AI to Crush CTF Challenges and What I Learned Along the Way, Investigations Facilitator

Brian Krebs
Opening Keynote - Brian Krebs, Investigative Journalist & Cybersecurity Expert

Kyriakos Lambros
Preparing for AI Governance in Colorado’s Emerging Regulatory Environment
From Chaos to Control: Merging AI Strategy with Robust Governance, RockCyber, LLC - CEO & Founder

Ross Lazerowitz
Evolving Social Engineering Threats: From Traditional Tactics to AI-Powered Voice and Video Scams, Mirage Security

Jason Lewkowicz
Who’s Left Holding the Stick? Personal Liability for Cybersecurity Professionals, Ernst & Young

Steve Linn
Practice makes Perfect - Table Top Exercise for a Ransomware Incident

Erin Locker
Privacy Considerations of Automated Decision-Making in the Age of AI

Kamal Maheshwari
Data Security, Privacy and Trust Walk Into A Bar...

Danny Manimbo
Implementing and Operating an AI Management System with a Compliance Perspective, Schellman - Principal

Charlie Marmon
Defending against Cyber Attacks: A Risk Management Approach
How to partner with Federal Law Enforcement for Cybersecurity, CISA - Cybersecurity State Coordinator

Merry Marwig
Your Car's Hidden Passengers: Companies, Cops, and Criminals. Retake Control, Privacy4Cars

Joe McCallister
Unstuck in the Middle - I made it into Cyber, now what?

Scott McCandless
Flipping the Script: From the Trenches to the C-Suite - Panel
Maintaining Good CISO/Vendor relationships

Joseph McComb
Cyber CISO Marksmanship: Hitting the Mark in Cyber Security Leadership
Maintaining Good CISO/Vendor relationships, Holland & Hart, LLP

Keyanne McCray
Risk Governance Roundtable

Heidi McDonald
Women In Security - Morning Session, Valkyries' Information Security - Investigations Facilitator

Chris McLaughlin
Seven Steps to a Sustainable OT Security Program, Johns Manville - CISO, Vice President - Denver Chapter

Chase Millea
Privacy Considerations of Automated Decision-Making in the Age of AI, KO Law PC

Rich Mogull
Beyond the SOC: Scaling Response with the Incident Command System, Securosis/FireMon

Liz Morton
CISO Summit - Destination Leadership: Mapping the Path Forward, Axonius

Jason Myszkiewicz
How to partner with Federal Law Enforcement for Cybersecurity

Merlin Namuth CISSP, GCFA, GCIH, PMP
Panic, Triage, Repeat: The Art of Cyber Crisis Management, City and County of Denver - Chief Information Security Officer

David Navetta
Data with Borders: the DOJ's Final Sensitive Personal Information Access Rule

Nicole Nguyen
AI, Privacy, and Security: Striking the Perfect Balance

George Nsude
Cloud security audit a Step-by-step approach, Ritter Communications

Mike Pedrick
Your Car's Hidden Passengers: Companies, Cops, and Criminals. Retake Control

Josh Peltz
CISO Summit - Destination Leadership: Mapping the Path Forward, Zero Networks

Daniel Pietragallo
Preparing for AI Governance in Colorado’s Emerging Regulatory Environment

Justin Pollard
Your Car's Hidden Passengers: Companies, Cops, and Criminals. Retake Control

Gopi Ramamoorthy
Orphan Accounts and Open Doors: Securing Disconnected Apps, Symmetry

Brian Reimer
Maintaining Good CISO/Vendor relationships, Cato Networks

Richard Reinders
Digital Assets - securing keys, wallets and infrastructure (and what if it goes wrong)

Brad Rhodes
Volt and Salt Typhoon Living-off-the-Land (LOTL): The Rise of LOLBins, Department of Energy / Energy Threat Analysis Center

Shelley Rossell
Women In Security - Morning Session, Solventum - Cloud Security Architect

Rob Rudloff
Legal Rights After a Business Email Compromise -- facing reality when prevention fails, RubinBrown LLP - Partner, Cyber Security Services

Mike Ruehmkorff
Explore a new era of SecOps and NG SIEM built on AI with blazing fast performance, City of Hope - System Chief Information Security Officer

Ben Ryder
RACI in InfoSec - How understanding role responsibility and accountability can make everything better, The Anschutz Corporation - Security Program Manager

Eric Sampson
Real-World Lessons from Compliance Failures, Schellman

Rohit Satpathy
So, you’ve been hacked: Jurassic Park Edition, The PC Security Channel - Founder and CEO

Craig Savage
Protecting the unpatchable - what do you do when you can't apply a security patch?, Spinnaker Support - Head of Enterprise Security

Wayne Schepens
Generative AI: The Worst Form of Shadow IT, Cyber Risk Alliance - Chief Cyber Market Analyst

Josh Shepard
Observations in Obfuscation - Phishing Link Obfuscation Techniques, Radicl

Scott Sherman
Security is no longer a Secret : Blame YouTube

Joe Sigman
Implementing and Operating an AI Management System with a Compliance Perspective, Schellman

Craig Stanland
How I Got Caught: A Deep Dive Into an 800K Fraud, Self-Employed - Reinvention Architect

David Stauss
Hot Topics in Privacy Law, Husch Blackwell LLP - Partner

Greg Sternberg
You're not as worried about deep fakes as you should be., Evotek - Security Architect

Brian Sudis
Leadership, Cybersecurity & the CISO - Wish I Had Known ..., American Cyber Security Management - vCISO

Larisa Thomas
Privacy Without Borders: A Practical Roadmap to Harmonizing Healthcare and Privacy Regulations, NOX HEALTH - VP & CISO

Chris Tuzeneu
Security on a Budget: Augmenting Your Program with Open Source Solutions, CivITas Bank Solutions

Frank Victory
Beyond the Hype: Leveraging MITRE Caldera for Practical Risk Assessment, Denver OWASP - Vice President

Blaise Wabo
SOC 1 and SOC 2 Attestation Reports: Ensuring Trust and Compliance, A-LIGN - Healthcare Director

Bob Wall
Illuminating the Dark Corners of AI: Exploiting Shadow Data in AI Models and Embeddings, IronCore Labs, Inc

Jeff Whitney
Legal Rights After a Business Email Compromise -- facing reality when prevention fails, Husch Blackwell LLP

Keyaan Williams
Risk Governance Roundtable, CLASS-LLC - Managing Director

Steve Winterfeld
How to partner with Federal Law Enforcement for Cybersecurity, CVA - Advisory CISO

Karen Worstell
Preparing for AI Governance in Colorado’s Emerging Regulatory Environment, W Risk Group LLC

Gina Yacone
Breaking the Illusion: Leading Through Security and Innovation in a Disruptive Era, CISO Summit - Destination Leadership: Mapping the Path Forward

David Zetoony
Hot Topics in Privacy Law, Greenberg Traurig - Shareholder

Sponsors & Partners

2025 Sponsors

PREMIER SPONSOR:
• Evotek

DIAMOND SPONSORS:
• Google Cloud Security

PLATINUM SPONSORS:
• Auditboard
• Black Hills Information Security
• Cohesity
• Contrast
• Fastly
• illumio
• infoblox 800 x 450.png
• linford & co llp
• PDI Technologies
• red canary
• Richey May
• sailpoint
• Trend

GOLD SPONSORS:
• Axonius
• Comcast Business
• Cyberhaven
• InvokeSec
• Menlo Security
• Meedling Worldwide
• Ping 800 x 450.png
• proofpoint
• Rapid7
• risk3sixty
• tenable
• Virtual Armour
• Votiro

SILVER SPONSORS:
• ANM
• schellman
• Sentinel One
• Tevora