university of tulsa logo

Conference Agenda

Conference Agenda

Sunday, March 24

12:00 p.m.5:00 p.m.Registration Opens
3:00 p.m.5:00 p.m.Cyber Startup Challenge Pitch Competition
5:30 p.m.7:00 p.m.Opening Reception, Gathering Place (weather permitting)

Monday, March 25

7:30 a.m.8:30 a.m.Registration and Breakfast
8:30 a.m.8:45 a.m.Opening Remarks and Introduction
8:45 a.m. 9:45 a.m.Keynote: "Living in a Digital World: The Challenges and Opportunities Awaiting the Next Generation of Americans," John Brennan, Former Director of the Central Intelligence Agency
9:55 a.m.10:45 a.m.Leadership Track: Incident Response and Threat Detection
• "Incident Response and Cybersecurity Operations," Vincent Scott, Executive Director, STI-TEC Research Center
• "Threat Detection," Scott Shumate, Founder, Valutare
Technology Track: AI/ML in Cyber Security
• "Bringing Red vs. Blue to Machine Learning," Bobby Filar, Data Scientist, Endgame
• "Security Implications of Sharing ML-Trained Models," Bradley Skaggs, Senior Principal Research Scientist, Secureworks
10:55 a.m.11:45 a.m.Leadership Track: Know Your Adversary
• "Insider Threat," Crystal Lister, Sr Director, GPSG
• "Bots, Trolls and Warriors: The Modern Adversary Playbook," Andrea Limbago, Chief Social Scientist, Virtru
Technology Track: Application Security
• "Emerging Trends in Code Quality and Security Automation," Stephen Magill, Principal Scientist, Software Analysis, Galois
• "Securing and Defending Enterprise Applications," Mark Moore, Application Security Services Lead, Deloitte
11:45 p.m.1:15 p.m.Keynote/Lunch: "Cyber Security Workforce and Technical Challenges on the Frontier," Aanchal Gupta, Director of Security, Facebook
1:15 p.m.2:05 p.m.Leadership Track: Workforce Development
•"Recruiting - The Gender & Diversity Gap," Lauren Goodwin, Digital Security & Risk Officer, Global Projects Organization at BP
• "The Agile Cyber Workforce," Kim Keever, CISO, Cox Communications
Technology Track: Privacy Technology
• "Privacy Preserving Network Surveillance Technology," Michael Haney, Research Scientist, Idaho National Labs
• "Can We Protect Privacy Without Breaking the Web," Luke Crouch, Developer, Mozilla
2:15 p.m.3:05 p.m.Leadership Track: Elements of Corporate Culture
• "Protecting the Enterprise with People, Culture and Product," Tony Meehan, VP of Engineering, Endgame
• "Cybersecurity Training: What Works and What Doesn’t," Brad Brummel, Associate Professor of Psychology at The University of Tulsa
Technology Track: Tokenization and Vulnerability Management
• "Tokenization," Alex Pezold, CEO, TokenEx
• "Prioritizing Vulnerabilities According to Weaponized Exploits," Johnny Shaieb, VMS Manager - X Force Red, IBM
3:05 p.m.3:25 p.m.Break
3:25 p.m.4:15 p.m.Panel

• Dave Pocyznek, Chief Information Security Officer, BOK Financial
• Rich Lay, Special Agent, FBI
• Gary Lorenz
Moderator: Tyler Moore, Associate Professor of Cybersecurity and Information Assurance
Energy and Electricity
• Jerome Wild, Director, IT Applications Southwest Power Pool
• Timothy Fawcett, Senior Consultant, C.H. Guernsey & Co.
• Jason Nations, Senior System Security Analyst, OGE Energy Corporation
• Michael Meason, Senior Manager, Information and Security, Western Farmers Electric Cooperative
• Jay Coffey, Cybersecurity Practice Manager, Government Acquisitions
Moderator: Peter Hawrylak, Associate Professor of Electrical and Computer Engineering, The University of Tulsa
Oil & Gas

• Alex Barclay, Chief Information Security Officer, eLynx
• Jim Arrowood, Director of Information Security, ONEOK
• Nathan Singleton, Cybersecurity Manager, Helmerich & Payne, Inc.
• Geoff Goolsbay, Director, Enterprise Security, ONE Gas
Moderator: Mauricio Papa, Associate Professor of Computer Science, The University of Tulsa
• Karl Heimer, Principal at Heimer & Associates, LLC
• Larry Hilkene, Chief Product Cybersecurity Engineer, Cummins
• Gloria D'Anna, Lead PMA, Ford Motor Company
• Ben Gardiner, Senior Cybersecurity Research Engineer, National Motor Freight Traffic Association
Moderator: Jeremy Daily, Associate Professor of Mechanical Engineering, The University of Tulsa
4:25 p.m.5:15 p.m.Leadership Track: IoT Governance
• "Internet of Things: Dangers and Opportunities," Ido Kilovaty, Assistant Professor of Law, The University of Tulsa and Anthony Hendricks, Attorney, Crowe and Dunlevy
Technology Track: IoT and CPS Security
• "Wearable Security," Rose Gamble, Tandy Professor of Computer Science Engineering, The University of Tulsa
• "Connected Cars and the Cybersecurity Challenges Facing Them," Andrew Kongs, Security Engineer, Cylance
5:30 p.m.7:00 p.m.Networking Reception sponsored by Phillips 66
7:00 p.m.Keynote/Dinner: Nadav Zafrir, co-founder and CEO, Team8

Tuesday, March 26

7:30 a.m.8:30 a.m.Breakfast
8:30 a.m.9:30 a.m.Keynote: "Cyber Resiliency: The Intersection of Technology and Culture," Daniel Holtzman, Cyber Technical Director, Air Force
9:40 a.m.10:30 a.m.Leadership Track: Cyber 101 for Leadership
• "Encryption for Leadership," John Lister, VP, GPSG
• "Cybersecurity for Artificial Intelligence Solutions: A Framework for Reducing AI Vulnerabilities," Robert Gourley, CTO, OODA
Technology Track: Enterprise Security
• "Is Your Toaster an Insider Threat?" Robert Flores, CEO, Fidelis
• "Managed SIEM and Incident Response," Scott Williamson, VP, True Digital Security, Inc.
10:40 a.m.11:30 a.m.Panel: Fostering a Culture of Innovation in Cybersecurity: Global Thought, Local Action
• Jerald Dawkins, Founder and Chief Information Security Officer, True Digital Security, Inc.
• Pablos Holman, Inventor, Intellectual Ventures
• Jeremy Daily, Associate Professor of Mechanical Engineering, The University of Tulsa
• Mark Lauinger, Senior VP of Client Services, i2E
• Hank Haines, President and Founder, Sequoyah Technologies
• Diana Kelley, Cybersecurity Field CTO, Microsoft
Moderator: Robert Spoo, Chapman Distinguished Professor of Law, The University of Tulsa College of Law
11:30 p.m.1:00 p.m.Keynote/Lunch: "Insurance: Reshaping the future of cyber risk management in the 21st Century," Pascal Millaire, CEO, CyberCube
1:00 p.m.1:15 p.m.Closing Remarks and Adjourn
1:00 p.m.2:00 p.m.Optional Cybersecurity Consortium Information Session