Dallas Cybersecurity Conference

  • Conference

Unite with fellow cybersecurity professionals at the Dallas Cybersecurity Conference, a premier event designed to equip you with invaluable insights for skillfully navigating the dynamic landscape of cyber threats in 2024. Immerse yourself in the wisdom shared by industry visionaries and influential leaders, while also engaging directly with representatives from top-tier global providers of cybersecurity solutions.

Embrace the Dallas Cybersecurity Conference as your prime opportunity to connect with peers and industry experts, all within an engaging in-person environment. The dynamic discussions will encompass a diverse array of topics, from emerging cybersecurity challenges to ingenious strategies aimed at bolstering your organization against the ever-advancing tactics of threat actors.

Discover the full spectrum of tailored offerings provided by Data Connectors, exclusively curated for the Dallas Cybersecurity Conference, available right here!

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
07:30 AM to 08:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:30 AM to 09:15 AM
Keynote Presentation: Dare to Think Differently About Your Enterprise Security Approach in 2024
Solutions Showcase
logo (1)
Derek Melber
Chief Business Officer at Beak

Thank goodness 2023 is over! Recession, staff reductions, continued cyber attacks, and more breaches! The time is now to consider changing things up! Traditional security solutions such as basic firewalls, vulnerability management, and endpoint detections is just not sufficient for the onslaught of different tactics by attackers. Let 19X Microsoft MVP Derek Melber guide you through some radical thinking regarding the various aspects of securing your endpoints, servers, data, resource access, and more. Just a hint: good core security starts with good security hygiene! By the time you are finished with this engaging keynote, you will want to start analyzing your current approach and considering how you will revamp your security strategies to make a bigger impact in your overall security risk and hygiene.

09:15 AM to 09:55 AM
Safeguarding Organizations Amid the Rise of Shadow IT and Gen-AI
General Sessions
Todd Dekkinga
CISO at Zluri
Add to Calendar 05/16/2024 09:15 AM 05/16/2024 09:55 AM Safeguarding Organizations Amid the Rise of Shadow IT and Gen-AI

With the rapid evolution of the digital workplace, companies now face evolving risks from the rise of Shadow IT and Gen AI tools. With three out of five workers using or planning to use generative AI tools like ChatGPT, organizations grapple with mounting compliance and security risks, as users leverage these tools to create content and code that interacts with sensitive data. In this session, we will explore strategies for empowering security leaders to maintain visibility and control in the perimeter-less era and govern access to their applications.

With the rapid evolution of the digital workplace, companies now face evolving risks from the rise of Shadow IT and Gen AI tools. With three out of five workers using or planning to use generative AI tools like ChatGPT, organizations grapple with mounting compliance and security risks, as users leverage these tools to create content and code that interacts with sensitive data. In this session, we will explore strategies for empowering security leaders to maintain visibility and control in the perimeter-less era and govern access to their applications.

10:20 AM to 10:55 AM
The good, the bad and the practical - Managing risk in an AI based supply chain.
General Sessions
Alan Elliot
Chief Revenue Officer at Panorays
Add to Calendar 05/16/2024 10:20 AM 05/16/2024 10:55 AM The good, the bad and the practical - Managing risk in an AI based supply chain. Discover the transformative impact AI can have on supply chain management practices. Delve into the dynamic realm of third-party cyber risk as we cover both the challenges and opportunities AI represents and the role it can play in protecting your digital supply chain against cyber threats. Gain the practical knowledge needed to equip your business with the necessary tools to protect your digital supply chain in today’s complex environment.
Discover the transformative impact AI can have on supply chain management practices. Delve into the dynamic realm of third-party cyber risk as we cover both the challenges and opportunities AI represents and the role it can play in protecting your digital supply chain against cyber threats. Gain the practical knowledge needed to equip your business with the necessary tools to protect your digital supply chain in today’s complex environment.
10:55 AM to 11:30 AM
You Need a Password Manager - Here's why and what to Look For
General Sessions
Jerome Ferrara
Principal Product Specialist at LastPass
Add to Calendar 05/16/2024 10:55 AM 05/16/2024 11:30 AM You Need a Password Manager - Here's why and what to Look For

How individuals and organizations manage access to the services they use can be the first line of defense against bad actors. Learn ways to mitigate this risk and simplify the user experience at the same time.

How individuals and organizations manage access to the services they use can be the first line of defense against bad actors. Learn ways to mitigate this risk and simplify the user experience at the same time.

11:30 AM to 12:00 PM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Andy Stone
CTO - Americas at Pure Storage
Kris Everett
Cybersecurity Strategist & Architect at Clear Technologies
Alfredo Federico
Regional Director at BullWall
Raymond Neff
Field Sales Engineer II at ESET North America
12:05 PM to 12:35 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:35 PM to 01:05 PM
Keynote Presentation: Winning at the 'Team Sport" of Cybersecurity
General Sessions
event-simple-logo
Kenrick Bagnall
KONCYBER - Founder | Toronto Police Service Cybercrime Unit (C3) (Ret.)
Add to Calendar 05/16/2024 12:35 PM 05/16/2024 01:05 PM Keynote Presentation: Winning at the 'Team Sport" of Cybersecurity

With cybersecurity, success is not solely determined by technological fortifications but by the collaboration, synergy, and unified efforts of an organization. This keynote delves into the strategic imperative of treating cybersecurity as a “team sport.” Hear insights into the CISO’s playbook, exploring the vital role of cross-functional collaboration, organizational culture, and effective communication in achieving cybersecurity triumphs. Learn how fostering a united front can elevate your organization’s resilience and position it as a formidable force against evolving cyber threats.

With cybersecurity, success is not solely determined by technological fortifications but by the collaboration, synergy, and unified efforts of an organization. This keynote delves into the strategic imperative of treating cybersecurity as a “team sport.” Hear insights into the CISO’s playbook, exploring the vital role of cross-functional collaboration, organizational culture, and effective communication in achieving cybersecurity triumphs. Learn how fostering a united front can elevate your organization’s resilience and position it as a formidable force against evolving cyber threats.

01:30 PM to 01:50 PM
How to Operationalize Your Risk Assessments
General Sessions
Kayne McGladrey
Field CISO at Hyperproof
Add to Calendar 05/16/2024 01:30 PM 05/16/2024 01:50 PM How to Operationalize Your Risk Assessments

Risk assessments have moved beyond a check-the-box approach, especially with the SEC’s new disclosure requirements. Join us for our session, How to Operationalize Your Risk Assessment Process, to get practical guidance on navigating the complexities of risk assessments to drive tangible business outcomes. Kayne McGladrey, Field CISO at Hyperproof, will navigate through the essential steps required to operationalize risk assessments effectively within diverse organizational structures. From conceptualization to execution, participants will gain actionable insights into crafting and implementing tailored risk assessment strategies tailored to their unique organizational contexts. 

We’ll cover: 

  • Navigating the complexities of risk assessments amidst emerging SEC disclosure requirements
  • Actionable steps to effectively operationalize risk assessments
  • How to empower CISOs and their teams with insights to drive tangible business outcomes with risk assessments
  • How GRC software can help the risk assessment process and eliminate data silos between controls and risks

Risk assessments have moved beyond a check-the-box approach, especially with the SEC’s new disclosure requirements. Join us for our session, How to Operationalize Your Risk Assessment Process, to get practical guidance on navigating the complexities of risk assessments to drive tangible business outcomes. Kayne McGladrey, Field CISO at Hyperproof, will navigate through the essential steps required to operationalize risk assessments effectively within diverse organizational structures. From conceptualization to execution, participants will gain actionable insights into crafting and implementing tailored risk assessment strategies tailored to their unique organizational contexts. 

We’ll cover: 

  • Navigating the complexities of risk assessments amidst emerging SEC disclosure requirements
  • Actionable steps to effectively operationalize risk assessments
  • How to empower CISOs and their teams with insights to drive tangible business outcomes with risk assessments
  • How GRC software can help the risk assessment process and eliminate data silos between controls and risks
01:50 PM to 02:10 PM
The Importance of Meeting cyber insurance requirements
General Sessions
Raymond Neff
Field Sales Engineer II at ESET
Add to Calendar 05/16/2024 01:50 PM 05/16/2024 02:10 PM The Importance of Meeting cyber insurance requirements
02:10 PM to 02:40 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Kenrick Bagnall
Founder at KONCYBER
David Lee
Network Intrusion Forensic Analyst (NIFA) at United States Secret Service
Anthony Sims
Network Intrusion Specialist at Dept. of Homeland Security
Chad Adams
Supervisory Cybersecurity Advisor at CISA
Courtney Ping
Special Agent at FBI
03:00 PM to 03:20 PM
Data resilience best practices in a ransomware world
General Sessions
Stacey Budd
Data Resilience Evangelist at Arcserve
Add to Calendar 05/16/2024 03:00 PM 05/16/2024 03:20 PM Data resilience best practices in a ransomware world
03:20 PM to 03:50 PM
2024 Trends and Directions In Cybersecurity
General Sessions
event-simple-logo
Aaron Trott
Head of Partnerships at Invary
Allan Elliot
Chief Revenue Officer at Panorays
Brian Stone
Chief Revenue Officer at Pondurance
04:05 PM to 04:35 PM
Keynote Presentation: Building Cybersecurity Culture, Zero to Hero
General Sessions
event-simple-logo
Cecil Pineda
Senior Vice President and CISO at R1 RCM
Add to Calendar 05/16/2024 04:05 PM 05/16/2024 04:35 PM Keynote Presentation: Building Cybersecurity Culture, Zero to Hero
04:35 PM to 05:05 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
Cecil Pineda
Senior Vice President at R1 RCM, Inc.
Brad Waisanen
VP, Information Security at TTI,Inc.
Jeff Shaffer
CISO at Ben E. Keith Company
Louis Morton
Director of Information Security at Neiman Marcus
05:05 PM to 06:00 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Platinum Partners

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.