The Speakers

 

Keynote:

"The Future of Cyber—Let's Talk About Space"

Scott H. Stalker,
Founder & CEO
S2 - Stalker Solutions

ROOM 108

As we move deeper into the digital age, the intersection of cyber and space is transforming the future of defense, communication, and global security. In this keynote, Scott Stalker, a retired Marine and distinguished leader in Space, Cyberspace, and Special Operations, explores the critical challenges and opportunities emerging at this nexus.

We’ll dive into how cyberspace operations will shape space exploration, defense strategies, and the global economy, emphasizing the importance of cybersecurity in an increasingly interconnected world. Whether you’re in government, industry, or academia, this session will provide actionable insights into how we can innovate, protect, and lead in the era of space and cyber convergence.

Join us to uncover the future of cyber in a space-driven world.


Scott Stalker is a distinguished leader and speaker with over three decades of experience in the Marine Corps, encompassing roles in Space, Cyberspace, Intelligence, and Special Operations, along with seven combat tours in Somalia and Iraq. He served as the Command Senior Enlisted Leader for the Defense Intelligence Agency, National Security Agency, United States Cyber Command, and United States Space Command, from which he retired.

As the founder and CEO of S2-Stalker Solutions LLC, a Service Disabled Veteran Owned Small Business (SDVOSB), he leverages his extensive military background to drive leadership development and innovation.

In his current roles, Scott serves as a senior fellow at the National Defense University and contributes to the Marine Raider Foundation, Naval Intelligence Professionals, and the Wounded Warrior Project, where he holds a position on the Board of Directors. His unwavering dedication to supporting veterans and enhancing military and leadership strategies underscores his profound impact and commitment.

Scott holds a bachelor’s degree in Intelligence Studies, a master’s degree in Cybersecurity, and an Organizational Leadership certificate from the Harvard Kennedy School of Government. He also completed advanced studies at Johns Hopkins University School of Advanced International Studies, graduating from the SECDEF Strategic Thinkers Program CAPSTONE.

Scott resides in Wilmington, NC, with his wife Malerie, a Gold Star Sister, their three daughters, and English Bulldog Charlie.

Afternoon Keynote:

"Rediscovering Yourself, One Summit at a Time"

Mélanie Sandlarz,
Secureworks

ROOM 108

Change can be hard. Change is also a choice that we can embrace – or not. Sometimes, life puts you in a position where you must both make hard changes and embrace them so you can thrive. 

Mélanie’s presentation focuses on self-growth and uncovering the power that sits within us, enabling us to transform dreams into achievable goals. She will take you on her journey from being an out-of-shape Nutella, wine and cheese lover and flatlander to a beginner mountaineer ready to climb Aconcagua (22,837ft), the highest mountain in South America and tallest peak outside of the Himalayas. She will share some of her clumsy, humorous, uncomfortable and vulnerable moments that led her to make positive life changes, push her boundaries and decide to take on the challenge of the Seven Summits.

Mélanie grew up in Paris, France and got the travel bug very early in life. At the age of eighteen, she decided to move to the U.S. and graduated from The College of William and Mary with a B.S. in International Relations and Marketing. Her curious and creative mind led her to start a career in advertising and move to New York City where she joined Saatchi and Saatchi. She is now a seasoned marketer, team leader and brand steward with over 17 years of experience at agencies and organizations specializing in integrated marketing strategies and communications. She has worked with world renowned organizations including Pfizer, UCB, Nestlé and Sanofi. 

Her love for the mountains brought her to Colorado where she started hiking and exploring the front range. At that time, she also developed an interest in cybersecurity and joined the marketing team at Webroot (now OpenText). She is currently a Senior Product Marketing Advisor at Secureworks. In her free time, she focuses all her energy on training and exploring the outdoors.

Schedule and Speaker Bio

Meet the Winners of Wyoming's Cybersecurity Competition for Small Business

ROOM 108

In its seventh year, Wyoming's Cybersecurity Competition for Small Business features small companies that don't have technology help, yet the leaders took charge and learned to manage their risks. The program is 7 months of strategic cyber risk planning, assessments, mitigations, and policy writing. Join us to find out who won in 2024 and hear their stories!

Laura Baker runs two nonprofits, CyberWyoming and the CyberWyoming Alliance, which comprise multiple programs designed to help average citizens and Wyoming companies manage their security risks. Some of the business side programs include Wyoming's Cybersecurity Competition for Small Businesses and an apprenticeship program for tech professions. Other citizen programs include a weekly publication called the Hacker's Brief, Senior Fraud Alert Flyers, the annual cybersecurity conference, the Teens Exploring Careers Camp, and a school cyber safety video challenge. Laura holds a BS Marketing (UW), MBA (Texas Tech University), Associates in Risk Management, CISM (Certified Information Security Manager)


Meagan Herrington, Black Cat LLC, 

2023 Wyoming Cybersecurity Competition for Small Businesses Winners

Meagan has been with Black Cat LLC for nine years and has a Master of Business Administration from the University of Wyoming.  Black Cat won the Cyber Wyoming Small Business Cybersecurity Competition in 2023 and the Greater Cheyenne Chamber of Commerce Small Business of the Year.  Meagan is highly involved in the Cheyenne community and the Greater Cheyenne Chamber of Commerce being on several committees including; Military Affairs, USS Cheyenne, Adopt an Airman, Action and Advocacy, and Leadership Cheyenne.  She graduated from Leadership Cheyenne in 2023 and was the 2023 Boo Ball Chair. Meagan won the Greater Cheyenne Chamber of Commerce Emerging Leader of the Year for 2023.  She is also a board member for the Cyber Wyoming Alliance, Connect2Women, and CASA of Laramie County.  Her passion for Wyoming and helping others shows in all she does. 


2024 Wyoming Cybersecurity Competition for Small Businesses Winners

Joseph Whiteplume

Chief Information Security Officer

High Plains Power

Riverton, WY

Joseph Whiteplume is a seasoned cybersecurity and IT professional with over 25 years of experience in the industry. For the past 8 years, Joseph has served as a key member of the management team at High Plains Power, where his passion for safeguarding the network infrastructure and ensuring the seamless operation of the IT and metering systems is invaluable. In 2023, Joseph was named as a Co-op rising star by Rural Electric Magazine for his commitment to his cooperative and community. Before joining High Plains Power, Joseph honed his skills as the Network Administrator at the Wind River Hotel and Casino. In this role, he was responsible for managing and securing the casino’s network and business entities while ensuring robust and reliable connectivity for both guests and staff. Joseph’s extensive background in cybersecurity and IT, combined with his dedication to excellence, makes him a trusted and respected figure in his field and community. His commitment to staying ahead of emerging threats and technologies continues to drive his success and security of the organizations he serves. In his spare time, Joseph enjoys volunteering with the Special Olympics and spending time with his family in the great outdoors. Feel free to reach out if you’d like to connect with Joseph or learn more about his work and volunteering efforts.


Shantel Anderson

Senior Accountant and Non-profit Specialist

High Point CPAs

Laramie, WY

Shantel is a Wyoming native and a passionate advocate for making a positive impact in her community and beyond through volunteering. One might say she is a serial volunteer/servant and a champion of community. Shantel truly believes everyone is called to serve others in some capacity and is always looking for ways to connect others with places to serve.

In her professional life, Shantel is dedicated to serving others through her role as a non-profit accounting specialist. She believes that financial transparency and accountability are essential to ensure that organizations can effectively serve their missions and make a difference in the world. Shantel is committed to using my financial expertise to support non-profit organizations in their efforts to bring about positive change and in helping boards understand the numbers in order to do the work. 

When she is not crunching numbers at the office or dedicating her time to volunteer work, Shantel cherishes every moment spent with her three amazing kids, and our household wouldn't be complete without our border collie and award-winning Bengal cat. You can find us at home hanging out, playing games together, or helping out at the family ranch.


Jennifer Clark

The Goat Lady and CEO

The Goat Ladies (formerly known as J&J Second Chance Small Holdings)

Rock River, WY

Jennifer, and alongside her daughter Janna, are the operators of J&J Second Chance Small Holdings. Growing up on a small farm surrounded by diverse animals, she developed a profound connection with them.

After her graduation, she served in the United States Army across various MOS’s and experienced combat in Iraq, where she sustained injuries. Recovering from those challenging experiences has been a journey, and she continue to manage the aftermath. Animals played a pivotal role in her healing process, inspiring her to dedicate myself to their well-being.

Upon retiring from the military, the pull to return to the small farm life that shaped her upbringing was strong. Recognizing the need for second chances, particularly for goats, they realized that their community could benefit from the joy of being around these animals. This realization gave birth to the concept of their small holding, where goats bring a unique and unparalleled joy.

Janna, diagnosed with Autism and panic attacks, finds solace in animals. Whether holding them on challenging days, discussing them with others, or confiding in the goats when overwhelmed, this therapeutic connection has proven beneficial. They've observed it to be a valuable form of therapy for anyone facing challenges, as goats offer non-judgmental understanding and unconditional love.

In addition to caring for the animals, they host “Goat Therapy” events for locals seeking joy. This therapy involves the happiness derived from petting, talking to, and holding goats—a blend of the therapeutic qualities found in dogs, cats, and horses. Animals, especially goats, have a unique ability to listen without judgment, making this form of therapy both comforting and uplifting. Furthermore, they actively contribute to helping animals find their forever homes. 


 

Quantum Cryptography: Start Panicking in 3, 2, 1..

ROOM 109

This high-level yet accessible presentation will cover the latest developments in quantum computing and how they could impact encryption and data security. I'll explain how we got here, what is being done to secure our data, and when we need to start worrying.

Frank Gearhart, Ph.D. (CISSP, CCSP) is a senior cybersecurity architect with Kratos Defense and the Vice president of ISSA Colorado Springs chapter with numerous articles published in ISSA International Journal on quantum computing, artificial intelligence, and machine learning. Member of ISSA Colorado Springs training team, 2017 ISSA International Volunteer of Year, ISSA Fellow, Honor Roll, Ph.D. dissertation on interpretable machine learning in cybersecurity published on ProQuest, B.S. in Professional Aeronautics, M.S. in Information Assurance & Security, Ph.D. in Computer Science

 

Awareness vs Preparedness

ROOM 108

Digital social engineering accounts of over 95% of all cyber attacks. If most companies are conducting cybersecurity awareness programs, why aren't we prepared for the attacks being conducted? Let's look forward to designing a human-centered cyber program, how humans communicate, the impact of social engineering, and how each person is affected differently.

Dr. Huffman is a founding researcher in the emerging field of Cyberpsychology, the study of how the human brain works while in a cyber environment. His research has been presented at NASA-Goddard, TedxColoradoSprings, TedXManitouSprings. His research has begun to uncover biological deficiencies in humans that function for survival in face-to-face interaction, but does not activate in a cyber environment. He has applied his research with trailblazing results in over 60 organizations worldwide. His research focuses on mental biological deficiencies that every person has in a cyber environment that allow attacks, like phishing and digital social engineering to continue to thrive.

 

AI Impacts on Cybersecurity – The Good, the Bad and the Ugly

ROOM 109

In an era where cyber threats are more prevalent and impactful, AI has a massive opportunity to help defenders... and shatter personal privacy all while helping hackers! This presentation will delve into the transformative role of AI in the cybersecurity industry from 3 major perspectives: privacy, cyber defense, and cyber offense. Attendees will gain an understanding of how cyber defense solutions leverage AI to deliver more proactive, predictive, and automated defenses, ensuring that organizations with constrained resources can thrive in the digital age without disruption.

Bill Clay is a Cisco Technical Security Architect focused on cybersecurity consulting for over 12 years in various technical roles and certifications with a recent focus on AI applications for cybersecurity. He is a Cisco Distinguished Speaker and is a consultative thought leader leveraging his passion around risk analysis to help organizations make effective use of their security investments. He currently resides in Denver, CO with his wife Adriana and four cats. When he isn’t helping organizations thwart attackers he enjoys golf, hiking, camping, skiing, and PC gaming.

 

Identifying and Reducing Attack Paths into Operational Technology (OT) Networks

ROOM 305

A practical overview of identifying and reducing risk associated with attack paths into operational technology (OT) critical infrastructure from both the Internet and information technology (IT) networks. While focused on OT, in particular water and wastewater, the concepts can be applied across industry. Attendees will leave with an increased understanding of the threat landscape, attack paths, and ways to increase assurance of their own infrastructure.

Richard Belisle is a jack of all trades technology and information security professional with almost 20 years of industry experience. Richard primarily has worked in the non-profit and public sector with positions in local government, healthcare, higher education, and K-12. In these organizations, Richard’s roles and responsibilities have ranged from threat intelligence, network/system administration, GRC, internal audit, penetration testing, OT cybersecurity, to leadership. Richard holds a Master of Science in Technology (Information Assurance) from Eastern Michigan University and maintains several industry certifications such as the CISA, CISM, CISSP, CRISC, CRTO and OSCP. He is passionate about securing our nation’s critical infrastructure.

 

Real World Cybersecurity: What can John Q Public do to stay safe?

ROOM 108

The cybersecurity landscape is overflowing with large forces: large threats, large companies, large vulnerabilities, large costs... and a large vocabulary of products all promising to make it better. SIEM, EDR, XDR, TDM, or FIM, all promising to solve your problems. Large forces like this present real challenges for small companies and individuals. Yet there are real world measures that nearly anybody can put into practice that can help you or your company stay safe.

Christopher D. Bonatti co-founded IECA as its president. He provides technical leadership on a wide range of client assignments involving system engineering, security analysis, protocol analysis, standardization and software. He is an internationally recognized expert in standards and protocol development with outstanding writing and presentation skills. He has nearly 30 years combined experience in the areas of computer security, information assurance (IA) cyber security, Internet based protocols, tactical communications and policy development. He also has strong skills at international negotiation, having been an active participant in the development of numerous agreements and solutions through world standardization bodies and technical committees. IECA clients include several well-known commercial organizations, some major learning institutions, and a long list of US government agencies. Mr. Bonatti is a life member of the Armed Forces Communications Electronics Association (AFCEA), and a former Certified Information Systems Security Professional (CISSP) and member of both the Institute of Electrical and Electronics Engineers (IEEE).

 

Anatomy of an Attack: MOVEit Transfer

ROOM 109

Cyber threat actors are opportunistic **expletives**! This is no different for entities like the CL0p cyber criminal group (Russia) that used a zero day and other vulnerable infrastructure in their summer ’23 and ongoing activities to target organizations globally for extortion. Now that the dust has settled on these malicious activities, this presentation explores the “anatomy” of the attack, victimology, preventability, and lessons learned that can help everyone!

Brad Rhodes, Senior Manager at Accenture Federal Services in Denver, CO, holds numerous professional certifications and he has 27+ years of experience in the military, government, and private sectors. He supports DOE leading a 24/7 team in defending the enterprise against current and future threats. Brad is Combat Veteran who continues to serve as a Colonel, Cyber Warfare US Army Reserve where he is the G6/Chief Information Officers for the 63D Readiness Division providing sustaining base communications for facilities across 7 states and 43,000 Soldiers, Civilians, and Contractors. Brad's major research includes utilizing Open-Source capabilities to help organizations close security gaps, characterize their cyber operating environments, and gain visibility into stacks of data. He's been known to drown Lego people illustrating the reality of cyber effects.

 

Industrial Control Systems Security: Past Attacks and Modern Defense Strategies

ROOM 305

The rise in attacks against industrial control systems (ICS) has become a major concern, particularly due to the potential impact on critical infrastructure such as power and water systems. The emergence of new technologies such as artificial intelligence (AI) has provided attackers with more powerful tools to develop sophisticated attacking strategies with minimal effort. This is further intensified by the increasing accessibility of technologies, reducing barriers to developing malware and threats. The history of malware attacks reveals the growing skills and capabilities of adversaries in performing complex attacks that can go unnoticed. The purpose of this document is to provide a detailed analysis of past attacks on ICS and examine the various technologies and capabilities available to implement a robust defense against modern threat actors.

Aneesh Karakkat is a highly experienced and passionate Staff Application Engineer at Woodward Inc, with a focus on developing industrial cybersecurity solutions for the power generation and oil and gas sectors. He is a certified GISCP professional with a strong expertise in industrial cybersecurity, failure analysis, and industrial networking. In addition to developing control solutions for steam turbines, gas turbines, and compressors, Aneesh is committed to staying up- to-date with the latest digital technologies to help clients embrace them and address the cybersecurity challenges facing the industry. He is dedicated to ensuring that clients are protected against cyber threats and can operate their systems with confidence in a rapidly evolving technological landscape.

 

The Human Factors Which Impact Cybersecurity Operations

ROOM 108

Join the the former director of CIA Cyber Operations in an interactive discussion exploring the human factors which significantly impact cybersecurity.

Robert (Rob) Jenkins is the Chief Executive Officer of Dark Forge Solutions LLC, a C-suite strategic advisory firm. From 2014-2021 he served in senior and executive positions at BAE Systems, NCI, and Leidos where he focused primarily on intelligence, defense, and cyber programs. Prior to that he spent 20 years at the Central Intelligence Agency leading operations, personnel, and cyber programs. Mr. Jenkins guest lectures with various organizations, developed the curriculum for and taught a graduate level asymmetrical threats class and capstone at Johns Hopkins University, and currently teaches at the University of Wyoming and the Laramie County Community College. He is a former Army infantry and special operations commissioned officer who also worked for several years on Wall Street. He is known for his thought leadership, creativity, and strategic grasp and comprehension of complex systems. Mr. Jenkins graduated from Dartmouth College with a history degree and dual Master of Business Administration degrees in marketing and finance from Pennsylvania State University. He is a Rotary International member and currently serves on the board of several corporations and non-profit organizations.

 

Apprenticeships: How Apprenticeships Affect Cybersecurity

ROOM 109

Wyoming is a rural frontier with expansive land, and is the least populated state. Many residents live in rural communities across the state where there is a significant lack of resources and training opportunities for individuals, especially for youth who are exiting high school and seeking employment and training opportunities. Registered Apprenticeship opportunities can and will fill the gap for career seekers and students who may be searching for quality career opportunities and want to stay and build a life in Wyoming. Cybersecurity is a critical field that protects our most important and private information. However, there is a severe shortage of qualified cybersecurity workers, especially with today’s constantly changing cybersecurity needs. This panel will allow apprenticeship experts to discuss their roles, responsibilities and available support for businesses to learn and explore the benefits of Registered Apprenticeship Programs.

Angela Baker: SAFAL Partner - As a Consultant and RA Apprenticeship Subject Matter Expert, Angela has over 16 years of experience in workforce development. She works with employers on Safal’s DOL national industry intermediary contract to design, implement, administer, and expand high-quality RA programs for cybersecurity and tech roles. She has extensive experience helping employers, secondary-level educational institutions and Career and Technical Education (CTE) programs develop RA programs and leverage federal, state and local resources to ensure long-term sustainability.

Robert Fife: DWS Apprenticeship - Robert Fife has been with the Wyoming Department of Workforce Services since August 2021 as a Grant Specialist for the Apprenticeship Team. He works with the Wyoming Apprenticeship Team to expand Registered Apprenticeship Programs in all occupations and strives to upskill the available workforce here in the great state of Wyoming. He provides technical assistance to businesses looking to register the programs, assists with the planning and host National Apprenticeship Week and Youth Apprenticeship Week events, and assists in operating the federal DWS Apprenticeship Grants.

Eric Trowbridge: Eric Trowbridge, widely known as ET, is the Director of Development & Enterprise Applications at Blue Federal Credit Union in Cheyenne, Wyoming. A native of Cheyenne, he graduated from Central High School in 2004 and furthered his education in art direction in San Francisco, subsequently working in the film industry in Los Angeles. After a stint in various art and design departments in the film sector, ET shifted to a leadership role at Apple, working in Los Angeles, New York City, and Chicago for over eight years.  In 2014, ET returned to Wyoming to focus on technology-oriented entrepreneurial endeavors, founding Array in 2016. Array emerged as Wyoming’s first accelerated private school, specializing in graphic design, computer science fundamentals, and web development. He served as the CEO until August 2021, significantly impacting technology education in the region.  Beyond his professional career, ET has actively engaged in community and state-wide initiatives. He was appointed by the Mayor of Cheyenne in 2018 to lead a broadband task force aimed at improving broadband access across the city. That same year, he was appointed to the Wyoming Workforce Development Council by the state's Governor, where he now serves as Chairman, playing a pivotal role in shaping workforce development strategies in Wyoming.

Dylan Wood: Apprentice for DigeTekS LLC - Dylan is a central Wyoming native that graduated from CWC with a humanities degree but realized he loved STEM, which led him to work in the audio visual industry, traveling throughout the nation to perform installations.  His first on-site installation job had all the wrong parts, leading to some serious problem solving to make the customer happy.  After three years, Dylan decided to shift to work for Digeteks LLC, a managed service provider with a prominent client base in Wyoming.  Dylan has worked for Digeteks for over a year, is enrolled in their registered apprenticeship program, and supports Wyoming businesses.  He recently passed his MS102 Certification and is working on his CompTIA A+ Certification.

Shane Brown: Apprenticeship Employer for DigeTekS LLC - Shane Brown has more than thirty years of experience designing, optimizing, and securing data systems and network infrastructures for various organizations. Shane has been CEO of DigeTekS since 2008 and has worked to ensure strong IT security in client environments, providing expertise to hundreds of businesses ranging from small companies to large organizations, including Ball Aerospace, Burlington Coat Factory, airlines, banks, and local governments.

 

Mastering the Data Governance Maze: From Risk Mitigation to Process Excellence

ROOM 305

Join me for a 40-minute exploration into the world of data governance, where I'll unravel the intricacies of managing data assets for organizational success. This technical talk will spotlight the pivotal role of data governance in mitigating risks and enhancing processes. Participants will leave with actionable insights to craft and implement a robust data governance strategy that not only manages risks but also propels positive change within their organizations.

Cher Fox is a data leader that's been solving the data puzzle for over 35 years. As the President and Founder of Fox Consulting, she advises organizations to define & optimize processes, quality & intelligence, to solve their most painful data insight issues. Her 3+ decades of deep practitioner experience, in data, analytics, & business intelligence, designs & implements secure strategic analytics roadmaps for global companies' most complex financial data solutions. Cher also shows senior data leaders how to be confident in leveraging the existing software they already own to save time & money solving their technology, data and business intelligence challenges.

 

Cybersecurity Can Seem Overwhelming, But It’s Just A Few Simple Steps

ROOM 108

You hear of friends, neighbors, local/national businesses, and governments who have cybersecurity incidents from email hacks to shutdowns that cost millions to recover from. Is your business safe? Are you sure? How do you defend against professional hackers targeting your business? Shane Brown, CEO of DigeTekS and a nationally recognized cybersecurity expert, will present the strategies and tools you need to ensure your business is safe from cybersecurity threats. Protecting your business is just four simple steps.

Shane Brown has more than thirty years of experience designing, optimizing, and securing data systems and network infrastructures for various organizations. Shane has been CEO of DigeTekS since 2005 and has worked to ensure strong IT security in client environments, providing expertise to hundreds of businesses ranging from small companies to large organizations, including Ball Aerospace, Burlington Coat Factory, airlines, banks, and local governments.

 

Does AI Hallucinate Electric Sheep? Security and the Brave New World of Artificial Intelligence

ROOM 109

Large Language Models (LLMs) are advanced Artificial Intelligence (AI) models that process human inputs and respond with human-like outputs. What began as simple neural networks has exploded into AI running everything from financial institutions to autonomous vehicles to military weapons. But with the rise of LLMs comes new security threats. In this talk, we’ll look at those threats and what they mean for our society, the decisions we make and our organizational safety and security.

Matthew Butler is an international speaker, trainer and security researcher who has been writing software professionally since 1990. He has spent the past three decades as a systems architect and software engineer developing systems for network and applications security, real-time data analysis and safety critical systems. He is a member of the ISO C++ Standards Committee and is focused on core language features, software vulnerabilities and safety critical systems and founded the ISO committee's Safety and Security Review Group. He is also a member of the Society of Automotive Engineer's Standards Committee working on safety and security for autonomous vehicles. His first book, "Exploiting Modern C++: Writing Secure Software For An Insecure World" is due out in 2025.

 

Helping to Develop Your Future Workforce

ROOM 305

Are you concerned about who will be replacing staff that may be retiring or seeking other opportunities? How can you be involved in helping potential employees come to you with the skills you need? How can you connect with promising future employees before your competition? This workshop will help you unlock the mystery of employee recruitment before you are just one of many job options for potential employees.

Dr. Michelle Aldrich is currently the Wyoming State Supervisor of Career & Technical Education and Perkins Funding. She spent 8 years teaching the family resource management strand at the University of Wyoming as adjunct faculty. She has been teaching nutrition at two Wyoming community colleges over the last 26 years in nutrition and education. Dr. Aldrich was a Family & Consumer Science Teacher at Triumph High School in Cheyenne for 15 years, which is the oldest and largest alternative high school in Wyoming with 250 students in grades 9-12. Dr. Aldrich has won national teaching awards in culinary arts, was named the Wyoming Career and Technical Education Teacher of the Year, and honors that include the 2021 Rising Star Award from advanced CTE and the 2021 Wyoming Women of Influence in Education.

 

Forgotten Lessons: Why We Keep Making The Same Security Mistakes

ROOM 108

Today, even the best defended organizations find themselves being penetrated. From Colonial Pipeline to The Office of Personnel Management to Equifax to AT&T, organizations that have spent years investing in security still find themselves successfully breached. But as we investigate how these attacks succeed, we find that patterns begin to emerge. In this talk, we’ll find out why this is and what you can do in your organization not to repeat the same mistakes.

Matthew Butler is an international speaker, trainer and security researcher who has been writing software professionally since 1990. He has spent the past three decades as a systems architect and software engineer developing systems for network and applications security, real-time data analysis and safety critical systems. He is a member of the ISO C++ Standards Committee and is focused on core language features, software vulnerabilities and safety critical systems and founded the ISO committee's Safety and Security Review Group. He is also a member of the Society of Automotive Engineer's Standards Committee working on safety and security for autonomous vehicles. His first book, "Exploiting Modern C++: Writing Secure Software For An Insecure World" is due out in 2025.

 

A Participant's Perspective of the CISA Critical Infrastructure Assessment

ROOM 109

The words 'raving fans' aren't often used about audits, IT professionals, or a government program, but that's what a Wyoming bank's IT team became after participating in the free CISA critical infrastructure assessment program. Words like quality, safe, transparent, and thorough are used to describe their experience. Hear how they benefitted and learned and see how this could be applied to your organization.

Panel Moderator:

Christopher Sundberg works at Woodward, Inc., a 150+ years old company.  My role is lead Product Cybersecurity Engineer in Woodward's Corporate Engineering department. I help our business units (Industrial and Aerospace) architect and develop security into the products that go into critical infrastructure, airplanes, or automotive applications.  Currently I am co-lead for the SAE G-32 Cyber physical Systems Security Standard (Software Assurance) as well as the G-34 Artificial Intelligence in Aviation standard liaison. Hobbies include vintage racing, ice hockey, and hiking/skiing. He has experience with19 years industrial controls, 25+ software engineering, Cyber-physical systems security engineer. Also, he is familiar with information and cybersecurity standards and practices.

Panel:

Jeff Grimes is the long-time IT Manager at the First National Bank of Gillette, leading the IT team through defensive measures, upgrades, audits, and training.  Jeff has had a career in IT since 1986. 

Timothy Walsh currently works for the Cybersecurity and Infrastructure Security Agency (CISA) as a Cyber Security Advisor (CSA) supporting the State of Wyoming. Tim previously worked for the State of Wyoming in Information Technology/Cyber Security for over 13 years and was the Chief Security Officer for the State before working for CISA.

Mikki Munson is a Wyoming native and recently retired from the Wyoming National Guard after 20 years of service. She worked as the J2- Intel NCO for the Wyoming Military Department Joint Staff and retired from the 243d Air Traffic Control Squadron assigned as Command Support Staff. Mikki is currently working as the Cybersecurity Advisor (CSA) for the Cybersecurity Infrastructure Security Agency (CISA) where she provides best practices, cyber assessments, and exercises to the State of Wyoming. Mikki worked at the Wyoming Office of Homeland Security as their Cybersecurity and Critical Infrastructure Protection and Resiliency Program Manager for almost 6 years. Additionally, Mikki is a Continuity of Operations Planning (COOP) Master Planner. 

 

Strategic Decision-Making: CEO's Guide to Optimal Information Security

ROOM 305

A surge in cyber-attacks targeting IT frameworks has raised the dire need for business executives and CEOs to redefine their security vision. In this presentation, gain a comprehensive understanding of the current threat landscape, risk assessments, and strategies for protecting organizational assets.

Cher Fox is a data leader that's been solving the data puzzle for over 35 years. As the President and Founder of Fox Consulting, she advises organizations to define & optimize processes, quality & intelligence, to solve their most painful data insight issues. Her 3+ decades of deep practitioner experience, in data, analytics, & business intelligence, designs & implements secure strategic analytics roadmaps for global companies' most complex financial data solutions. Cher also shows senior data leaders how to be confident in leveraging the existing software they already own to save time & money solving their technology, data and business intelligence challenges.