Tulsa Cyber Summit - College of Engineering & Natural Sciences

Virtual Tulsa Cyber Summit

Tulsa Cyber Summit 2021
Session & Panel Descriptions

The virtual Tulsa Cyber Summit will feature four keynote speakers, three panels, and featured speakers on two parallel tracks for leadership and technology. Participants can choose to attend sessions discussing cybersecurity issues at the leadership or technical levels. Participants are free to move between tracks as desired.


Leadership Track Session Descriptions

Cybersecurity Culture

What is it that drives success in cyber security for the organization? It can be summarized in one word: Culture. Culture sets goals and aspirations rooted in organizational ethos and binds them to practice and habit. This session discusses the ways in which a healthy culture can be cultivated and nurtured within a digital enterprise to combat cyber risk.

Cyber Workforce Development

The unvarnished truth in the world of cyber security is that, while technology abounds, skilled practitioners are in short supply. And while cybersecurity talent is hard to come by, it is even more difficult to develop. This session presents issues that impact cyber security workforce development from an organizational perspective.

Enterprise Risk

Risk is something we live with every day. Even when robust controls are in place, an organization or individual is confronted with residual risk. This session describes various aspects of cyber security risk to the enterprise and discusses some strategies for its management and mitigation.

Cybersecurity Education

Education in cybersecurity is not a “one-size fits all” situation. End users and system operators need some cyber security literacy and awareness, security practitioners need specialized skills and training, while management and C-level employees might require an educational background that lets them connect the dots. This session provides a valuable perspective from educational leaders on the spectrum of cybersecurity educational offerings both regional and nationwide.

Healthcare Information Security and Privacy

There is no other category of information that is more personal and intimate in nature than our medical records. As digital healthcare data and information systems mushroom in scope and use, their security and our privacy are at stake. This session highlights the emerging hazards and solutions on this particular battlefront in cyber space.

Technology Track Session Descriptions


Judge Louis Brandeis succinctly characterized privacy as “the right to be left alone.” Its entangled relationship with cybersecurity is underscored with each headline that documents the latest data breach. This session will expose the audience to that intersection with a focus on relevant technology issues and trends.

Application Security

Applications and software are tempting targets for the cyber adversary. Malicious code and attacks on digital logic can expose the keys to the kingdom, leaving a company or organization completely at the mercy of a threat actor. This session presents tools and techniques for improving the state of affairs for the enterprise concerning the security of applications and system software they develop, field, operate and manage.

Your Digital Footprint

When it comes to the value proposition relating risk management and the size of your organization’s digital footprint, less is more. Balancing mission support and cyber security in this regard can be a high-wire act. This session puts the spotlight on this endeavor and exposes the role of technology in supporting its pursuit.

Vulnerability Management

Vulnerability management has become a micro-industry within cyber security. Indeed, a robust cybersecurity posture calls for a mature approach to managing vulnerabilities with a strategic application of threat intelligence to security control deployment. This session is intended to offer a technological backdrop to the area, helping the audience navigate the confusing maze of terminology and solutions.

IoT Security

The Internet of Things has transformed the everyday appliance into a threat vector. Toasters, kiosks and automobiles collect data, have Internet addresses, and run software susceptible to attack. This session offers a look at some of the threats and on-going work to address them in this new wild west of cyber space.

Cybersecurity Operations

A constellation of technologies supports cyber security operations. Some are front and center while others operate behind the scenes. This session explores selected technologies fundamental to this aspect of an organization’s cybersecurity presence. A special element of the session is that it considers cybersecurity operations for both IT and OT.

Panel Descriptions

Leadership Panel: Advancements in Cyber Innovation

Any inventor will tell you that the idea is the easy part. Its transformation into a real-world practical solution places the innovator on a path fraught with challenges and pitfalls. This panel opens a conversation on cyber innovation and describes novel programs and efforts to foster it within organizations and communities.

Gender and Diversity in the Cybersecurity Workforce

Establishing and raising the standard for inclusiveness in gender and diversity for the cybersecurity workforce is of paramount importance for the growth of the field and for the health of organizations. But obstacles remain and progress is hard-won. This panel brings to bear the experience of professionals on this topic and presents their insights on how to overcome systemic obstacles and create wins for organizations on this front.

Cybersecurity Challenges for the Small and Medium Enterprise

Not every organization is blessed with the resources a Fortune 500 company can allocate towards the defense of their digital assets. Threat actors now recognize the asymmetry at play: while small to medium enterprises are relatively limited in their ability to build out gold standard security infrastructures and operations, they nevertheless must protect sensitive data and high value assets. Moreover, they often provide an avenue for adversaries targeting bigger game. Panelists in this session will discuss the special challenges small and medium enterprises face in cybersecurity and offer some wisdom on how to cope with them.


Have questions? Email us at cybersummit@utulsa.edu.

  • Event Schedule

    Monday, March 15

    *Schedule is subject to change.
    9 a.m.10 a.m.Keynote
    A conversation with Bruce Schneier and Dr. Tyler Moore
    10 a.m.11 a.m.Leadership Track: Cybersecurity Culture
    Heidi Shadid, Attorney at Eller & Detrich P.C.
    John Lister, GPSG
    Safi Mojidi, Mindpoint Group
    Technology Track: Privacy
    Andrea Little Limbago, Interos
    Timothy Fawcett, Guernsey
    Tyler Moore, The University of Tulsa
    11 a.m.11:15 a.m.Expo Hall Break
    11:15 a.m.12:15 p.m.Leadership Track: Cyber Workforce Development
    Randy Roberts
    Bradley Brummel, The University of Tulsa
    Bonnie Stith, Sepio Systems
    Technology Track: Application Security
    Luke Crouch, Mozilla
    Kris Wall, Stinnett & Associates
    12:15 p.m.12:30 p.m.Expo Hall Break
    12:30 p.m.1 p.m.Lunch Break
    1 p.m.1:30 p.m.Featured Speaker Erin Kenneally, Director of Cyber Risk Strategy, Guidewire
    Ransomware- A Darwinian Opportunity for Cyber Insurance
    1:30 p.m.2:30 p.m.Leadership Track: Enterprise Risk
    Renee Wynn, former CIO of NASA
    Vince Scott, Sentir
    Gary Lorenz, Cyber Risk Executive
    Technology Track: Your Digital Footprint
    Lance Watson, Avansic
    Jon Clemenson, TokenEx
    Crystal Lister, GSPG
    2:302:45 p.m.Expo Hall Break
    2:45 p.m.3:30 p.m.Panel: Gender and Diversity in the Cybersecurity Workforce
    Moderator: Vidhyashree Nagaraju
    Andrea Little Limbago
    Bonnie Stith
    MSgt Mike Feggans
    Camille Singleton
    3:30 p.m.4:15 p.m.Phillips 66 Networking Reception

    Tuesday, March 16

    9 a.m.10 a.m.Keynote
    A Conversation with Admiral Michael Rogers and John Rogers, CISO at MSCI
    10 a.m.11 a.m.Leadership Panel: Advancements in Cyber Innovation
    Moderator: Jennifer Hankins
    Gina Hitz
    John Pyrovolakis
    Sean Alexander
    Technology Track: Vulnerability Management
    Scott Williamson, TRUE Digital
    Tripp Hardy, Reprivata
    Johnny Shaieb, IBM
    11 a.m.11:15 a.m.Expo Hall Break
    11:15 a.m.12:15 p.m.Leadership Track: Cybersecurity Education
    Don Pipkin, TTC
    Tyler Moore, The University of Tulsa
    Ken Dewey, Rose State College
    Technology Track: IoT Security
    Hannah Robbins, IBM
    Matt Hale, University of Nebraska
    Mauricio Papa, The University of Tulsa
    12:15 p.m.12:30 p.m.Expo Hall Break
    12:30 p.m.1 p.m.Lunch Break
    1 p.m.1:30 p.m.Featured Speaker
    Derek Vadala, Cyber Assessments
    Measuring and Communicating About Cyber Risk
    1:30 p.m.2:30 p.m.Leadership Track: Healthcare Information Security and Privacy
    Joe Walker, MyHealth
    Dr. Nick Davis, Verinovum
    Master Sergeant (MSgt) Mike Feggans, Vance AFB Clinic
    Technology Track: Cybersecurity Operations
    Camille Singleton, IBM
    Vince Scott, Sentir
    2:30 p.m.2:45 p.m.Expo Hall Break
    2:45 p.m.3:30 p.m.Panel: Cybersecurity Challenges for the Small and Medium Enterprise
    Moderator: Johnny Shaieb
    Jerald Dawkins
    Heidi Shadid
    Timothy Fawcett
    Jeremy Price
    3:30 p.m.4:15 p.m.TU-Team8 Cyber Fellows Information Session

    *Speakers and panelists are subject to change.