Austin Cybersecurity Conference

  • Conference

Don't wait for a breach to happen, take action and safeguard your digital assets now!  This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Austin Cybersecurity Conference.  Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
08:00 AM to 08:30 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:30 AM to 10:00 AM
Cybersecurity Awareness Masterclass
General Sessions
George Finney
CEO of Well Aware Security
Add to Calendar 02/22/2024 08:30 AM 02/22/2024 10:00 AM America/Los_Angeles Cybersecurity Awareness Masterclass

People aren't the weakest link when it comes to cybersecurity in our organizations - they're the only link. And there is a key to helping anyone from an accountant to a doctor to be more cybersecure - habits. 

 In this Masterclass, George Finney, bestselling author of Well Aware and Project Zero Trust will show you how we can use neuroscience and psychology to influence the only thing that really matters in our security awareness training programs: behavior change.

 George will share his innovative approach to cybersecurity awareness to maximize the impact that security training can have on your organization.  Attendees will learn how to:

  1. Focus On The Outcomes - what we need from Security Awareness is behavior change. Make real progress by changing one cybersecurity habit one step at a time. 
  2. Think Like A Coach - We want to see our employees succeed in our mission to keep our organizations secure by finding their unique strengths and making them even better. 
  3. Make It Personal - We’ve reimagined cybersecurity awareness from the ground up based on psychology and neuroscience to deliver highly effective, personalized training.

It all starts with our free cybersecurity personality test that helps individuals discover their unique strengths and we create a personalized training plan for every employee and their specific role within the organization. Take the test free here prior to the start of the course:  https://wellawaresecurity.com/cyber-personality-test/

Location of the event

People aren't the weakest link when it comes to cybersecurity in our organizations - they're the only link. And there is a key to helping anyone from an accountant to a doctor to be more cybersecure - habits. 

 In this Masterclass, George Finney, bestselling author of Well Aware and Project Zero Trust will show you how we can use neuroscience and psychology to influence the only thing that really matters in our security awareness training programs: behavior change.

 George will share his innovative approach to cybersecurity awareness to maximize the impact that security training can have on your organization.  Attendees will learn how to:

  1. Focus On The Outcomes - what we need from Security Awareness is behavior change. Make real progress by changing one cybersecurity habit one step at a time. 
  2. Think Like A Coach - We want to see our employees succeed in our mission to keep our organizations secure by finding their unique strengths and making them even better. 
  3. Make It Personal - We’ve reimagined cybersecurity awareness from the ground up based on psychology and neuroscience to deliver highly effective, personalized training.

It all starts with our free cybersecurity personality test that helps individuals discover their unique strengths and we create a personalized training plan for every employee and their specific role within the organization. Take the test free here prior to the start of the course:  https://wellawaresecurity.com/cyber-personality-test/

10:15 AM to 10:45 AM
A Zero Trust Model for Enterprise AI and Data Security
General Sessions
Jimmy Phipps
Data Security, Privacy and Governance Evangelist at LightBeam
Add to Calendar 02/22/2024 10:15 AM 02/22/2024 10:45 AM A Zero Trust Model for Enterprise AI and Data Security

SaaS based AI/ML solutions often use your users/company data to train themselves posing a serious privacy and data security challenge. Furthermore, AI/ML models trained on public data may get dumber with time. At the same time, your employees need and have access to a wide variety of your users’ data that improves their decision making but can pose massive data exposure challenges. 

A zero trust model enunciates that organizations should always be in complete control of their data. The session describes an approach to strengthen your organizational data security continuously. Your teams can train their AI/ML models on the context-rich data of your business, all within your premises with zero data exfiltration.

SaaS based AI/ML solutions often use your users/company data to train themselves posing a serious privacy and data security challenge. Furthermore, AI/ML models trained on public data may get dumber with time. At the same time, your employees need and have access to a wide variety of your users’ data that improves their decision making but can pose massive data exposure challenges. 

A zero trust model enunciates that organizations should always be in complete control of their data. The session describes an approach to strengthen your organizational data security continuously. Your teams can train their AI/ML models on the context-rich data of your business, all within your premises with zero data exfiltration.

10:45 AM to 11:15 AM
Why Security Teams are Urgently Chasing API Security
General Sessions
Jackie Zhou
Application Security Evangelist at Datatheorem
Add to Calendar 02/22/2024 10:45 AM 02/22/2024 11:15 AM Why Security Teams are Urgently Chasing API Security

Cloud adoption and digital transformation have been driving amazing innovation in the past 20 years. With that, the most commonly overlooked attack surface is the growing number of APIs that subsequently come with the new cloud approach. Not only has Gartner confirmed APIs' rising prevalence as the attack vector of choice for bad actors, but Data Theorem has also been observing this rise in the last 5 years. 

An API security strategy is critical in getting started on the right foot. Join us to uncover the risks associated with this new world and discuss strategies on how to systematically secure these APIs. 

  •  Why APIs have risen to the top of the hacker's to-do list
  • How hackers are attacking APIs & extracting data
  • Top strategies to proactively secure APIs

Cloud adoption and digital transformation have been driving amazing innovation in the past 20 years. With that, the most commonly overlooked attack surface is the growing number of APIs that subsequently come with the new cloud approach. Not only has Gartner confirmed APIs' rising prevalence as the attack vector of choice for bad actors, but Data Theorem has also been observing this rise in the last 5 years. 

An API security strategy is critical in getting started on the right foot. Join us to uncover the risks associated with this new world and discuss strategies on how to systematically secure these APIs. 

  •  Why APIs have risen to the top of the hacker's to-do list
  • How hackers are attacking APIs & extracting data
  • Top strategies to proactively secure APIs
11:35 AM to 12:15 PM
Safeguarding Organizations Amid the Rise of Shadow IT and Gen-AI
General Sessions
Sethu Meenakshisundaram
Co-founder at Zluri
Add to Calendar 02/22/2024 11:35 AM 02/22/2024 12:15 PM Safeguarding Organizations Amid the Rise of Shadow IT and Gen-AI

With the rapid evolution of the digital workplace, companies now face evolving risks from the rise of Shadow IT and Gen AI tools. With three out of five workers using or planning to use generative AI tools like ChatGPT, organizations grapple with mounting compliance and security risks, as users leverage these tools to create content and code that interacts with sensitive data. In this session, we will explore strategies for empowering security leaders to maintain visibility and control in the perimeter-less era and govern access to their applications.

Key points of discussion

  • The sprawling SaaS ecosystem creates blindspots for security teams
  • Existing solution landscape to manage software
  • Uncover shadow IT and gen-AI apps with a 9-step discovery method providing 360-degree visibility into apps, users, entitlements, and usage patterns.
  • Restrict unsanctioned apps and AI tools to protect systems and data.
  • Monitor security posture (risks & threats) of apps and users
  • Enforce access controls through policy-driven workflows that govern who gets access to what app/resource.
  • Audit user entitlements and remediate over-permissive access.

With the rapid evolution of the digital workplace, companies now face evolving risks from the rise of Shadow IT and Gen AI tools. With three out of five workers using or planning to use generative AI tools like ChatGPT, organizations grapple with mounting compliance and security risks, as users leverage these tools to create content and code that interacts with sensitive data. In this session, we will explore strategies for empowering security leaders to maintain visibility and control in the perimeter-less era and govern access to their applications.

Key points of discussion

  • The sprawling SaaS ecosystem creates blindspots for security teams
  • Existing solution landscape to manage software
  • Uncover shadow IT and gen-AI apps with a 9-step discovery method providing 360-degree visibility into apps, users, entitlements, and usage patterns.
  • Restrict unsanctioned apps and AI tools to protect systems and data.
  • Monitor security posture (risks & threats) of apps and users
  • Enforce access controls through policy-driven workflows that govern who gets access to what app/resource.
  • Audit user entitlements and remediate over-permissive access.
12:20 PM to 12:50 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:50 PM to 01:30 PM
Keynote Presentation: Hacking Your Brain For Better Cybersecurity
General Sessions
event-simple-logo
George Finney
CEO of Well Aware Security
Add to Calendar 02/22/2024 12:50 PM 02/22/2024 01:30 PM America/Los_Angeles Keynote Presentation: Hacking Your Brain For Better Cybersecurity

The first step in your journey towards becoming secure is believing that you can be successful. Many of us are conditioned to believe we need to be cynical in order to be secure. In George's award-winning book, Well Aware, he demonstrates that the opposite is true...we can hack our own brain's "habit loop" to make being more secure easy. George will provide a roadmap on how to use the science behind habits that can help make security possible for anyone. 

Attendees will be able to: 

  • Identify their own top internal and external cybersecurity strengths 
  • Understand how habits play a role in helping us become more secure
Location of the event

The first step in your journey towards becoming secure is believing that you can be successful. Many of us are conditioned to believe we need to be cynical in order to be secure. In George's award-winning book, Well Aware, he demonstrates that the opposite is true...we can hack our own brain's "habit loop" to make being more secure easy. George will provide a roadmap on how to use the science behind habits that can help make security possible for anyone. 

Attendees will be able to: 

  • Identify their own top internal and external cybersecurity strengths 
  • Understand how habits play a role in helping us become more secure
01:55 PM to 02:15 PM
The Only Crash Course in Leadership, Sorcery, and Source Code
General Sessions
Ben Chappell
CEO at Apona
Add to Calendar 02/22/2024 01:55 PM 02/22/2024 02:15 PM The Only Crash Course in Leadership, Sorcery, and Source Code

Gain insights to critical leadership skills with Ben Chappell, CEO of Apona Security, to uncover a deeper understanding of our competing values. He will illustrate how this is woven into the fabric of security at a practical (source code) level, and reveal parallels to Lord of the Rings.

Gain insights to critical leadership skills with Ben Chappell, CEO of Apona Security, to uncover a deeper understanding of our competing values. He will illustrate how this is woven into the fabric of security at a practical (source code) level, and reveal parallels to Lord of the Rings.

02:15 PM to 02:35 PM
Be Uncommon - Don't Predict the Future, Create It
General Sessions
Zach McIlroy, MBA
Strategic GTM Director at aryaka
Add to Calendar 02/22/2024 02:15 PM 02/22/2024 02:35 PM Be Uncommon - Don't Predict the Future, Create It

Challenge the Status Quo, Take Risks, People Stock is the Greatest Investment

Challenge the Status Quo, Take Risks, People Stock is the Greatest Investment

02:55 PM to 03:25 PM
Guest Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power
General Sessions
event-simple-logo
Ed Adams
President & CEO of Security Innovation
Add to Calendar 02/22/2024 02:55 PM 02/22/2024 03:25 PM Guest Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams
03:25 PM to 03:45 PM
Book Signing / Ed Adams: See Yourself in Cyber
General Session
See Yourself in Cyber
Ed Adams
President & CEO of Security Innovation
Add to Calendar 02/29/2024 03:25 PM 02/29/2024 03:45 PM America/Los_Angeles Book Signing / Ed Adams: See Yourself in Cyber

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

Location of the event

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

03:45 PM to 04:15 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Ernesto Ballesteros
Cybersecurity State Coordinator (Texas) at DHS, CISA
Matthew Morris
Special Agent at Homeland Security Investigations (HSI)
Mike Alvarez
Network Intrusion Forensic Analyst at DHS
04:30 PM to 05:00 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
Andy Bennett
Vice President of Technology, CISO at Apollo Information Systems
Dean Crutchfield
CISO at Toast
Charles Valentine
VP CSO of Indeed and CIO at Crunchyroll, Boom Supersonic
Timothy Brown
CISO at SolarWinds
Dustin Bolander
Founder at Beltex Insurance
05:00 PM to 06:00 PM
Closing Remarks and Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Platinum Partners

  • zluri

Gold Partners

Silver Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.