SPEAKERS
If Only We Had More Budget for Security… (And Other Lies We Tell Ourselves)
This talk challenges the common belief that security fails because of underfunding. Instead, it explores how leaders actually make risk decisions and how reframing security conversations around clear risk tradeoffs leads to better outcomes, stronger accountability, and real buy‑in.
Jeremy Bauer
Jeremy Bauer serves as VP of IT Security and CISO at Molson Coors Beverage Company, where he leads global security strategy with a strong bias toward execution, adaptability, and outcomes. He focuses on building security programs that work in complex, multinational environments, balancing risk reduction, operational reality, and business enablement.
A U.S. Air Force veteran, Jeremy brings a practitioner’s skepticism shaped by real-world operational experience rather than theory. He is known for cutting through security theater to focus on controls that measurably reduce risk, with particular emphasis on detection engineering, zero trust architectures, and the practical realities of securing both IT and OT environments.
Jeremy is a regular speaker and community contributor who favors plain‑language, no‑nonsense discussions about what actually works at scale. Based in Milwaukee, he still proudly describes himself as an IT security nerd with a growing Lego backlog.
Debunking Dark Web Intelligence
In this session, we will dissect the five most persistent myths surrounding dark web threat intelligence. We will challenge assumptions such as:
- If you’re breached, it will show up on the dark web
- More sources equal better intelligence
- Underground analysis is best automated
- Personas / Sock puppets are required for meaningful access
- Dark web monitoring prevents ransomware
Attendees will leave with a practical framework for evaluating dark web intelligence programs, identifying when monitoring adds true operational value, and recognizing when it becomes security theater.
Kaylee Burns
Kaylee Burns is a cybersecurity professional with experience spanning threat intelligence, security operations, and enterprise advisory. She is a Senior Systems Engineer at Acuity Insurance specializing in threat intel.
OMG, You Did What?! Authorization in Practice
Authentication is only the starting point; authorization is where real security either holds or fails. This session examines practical authorization design for modern systems, including stateful and stateless models, delegated API access, and permission strategies that align with business roles and actions. It highlights common failure patterns—such as weak multi-tenant isolation, tokens lacking sufficient authorization constraints, and misplaced trust in gateways or third-party defaults—and presents concrete ways to prevent them. The talk also covers advanced challenges, including securing data reads, protecting sensitive metadata, enforcing time-limited access, and maintaining human attribution across service accounts and AI-agent workflows. Attendees will leave with a practical model and a stronger working understanding of how to build authorization that is enforceable, auditable, and aligned with Zero Trust principles.
Joern Freydank
Principal Product Security Engineer and Security Architect with more than 20+ years of experience, OWASP Conference Speaker and security podcast participant covering topics of Threat Modeling and Security Design Patterns. Currently working at Splunk/CISCO securing the Company's Products and Services.
Ctrl + Alt + Lead: Rebooting Cyber Culture with Human Skills
Technical skills may open doors in IT and cybersecurity, but leadership, communication, and mentorship help professionals grow and contribute at a higher level. As the field becomes more complex and mission-critical, success increasingly depends on how we build, lead, and support our teams. This session explores the human side of cybersecurity: how soft skills shape technical excellence by transforming capable individuals into trusted collaborators, advisors, and leaders. Drawing on nearly two decades of experience leading mission-driven teams, I’ll share actionable strategies for fostering psychological safety, developing mentorship programs, and communicating clearly under pressure. Participants will walk away with practical tools to strengthen their leadership presence and build teams that thrive in today’s high-stakes digital environment
Amanda Kollmorgan
Amanda Kollmorgan serves as the Deputy State IT Director for the Wisconsin Department of Military Affairs. She is passionate about building people-centered teams, mentoring emerging leaders, and driving innovation through collaboration. With nearly two decades of combined military and civilian experience, Amanda brings deep expertise in cybersecurity, IT operations, and strategic leadership.
Your Deployment Pipeline Ends at a Firewall Ticket
Your team automated the build, the test, and the deploy. Then the whole thing stalled at a firewall change request. That bottleneck isn't a process problem — it's an architecture problem. Organizations are migrating to the cloud but carrying network security assumptions from the data center that silently fail, creating rework loops that slow every deployment behind them.
Security groups aren't stateful firewalls. NAT gateways aren't DMZs. And when SDWAN enters the picture, direct internet breakout reshapes traffic flows in ways that bypass your entire inspection stack — often by design. This talk walks through the specific network security assumptions that break during cloud migration and hybrid architecture deployments, drawn from real-world engagements across AWS, Azure, and GCP. Attendees will leave with a practical audit checklist and the knowledge to build landing zones that pass security review the first time — so your pipeline doesn't end at a ticket queue.
Tyler Coady
Tyler Coady is a cloud security professional with hands-on experience in security engineering and cloud architecture across AWS, Azure, and GCP. His background spans both sides of the hybrid architecture problem — from managing firewalls, VPNs, and SDWAN deployments to designing and securing cloud workloads and landing zones. He has supported organizations through cloud migrations, security incident response, and compliance efforts including SOC 2, CMMC, FedRAMP, GovRAMP, and ITAR. Tyler is based in Northeast Wisconsin.
Resilient AI Governance: Designing for Failure, Abuse, and Recovery
Can your AI governance program survive its first real incident or the next AI revolution? Most companies approve tools, publish a policy, and call it done. Then the agentic assistant takes an action nobody authorized. The analyst trusts a summary shaped by an attacker's prompt. The model degrades and nobody can stop it.
This talk walks through five ways AI governance fails and why most programs are already outdated given the rate of AI innovation. We'll use first principles to map the five cracks most programs miss and show how each one impacts every cybersecurity discipline, from DFIR to GRC.
Thomas Freeman
Thomas Freeman is a vCISO and AI governance consultant at Ghostscale, with 30 years in IT and a decade in cybersecurity leadership. He holds CISSP, C|CISO, GPEN, GCIH, GCIA, and GCWN certifications. Before building governance programs for clients, Thomas spent 28 years as a professor, dean of education, director of penetration testing, and in other business leadership roles, which means he knows how to make complex frameworks stick with real audiences. At Ghostscale, he builds right-sized AI governance programs for organizations tired of policies that look good on paper and fail in production.
Cybernalities - Encouraging Small Humans Toward Cybersecurity Careers- a Practical Guide for Parents
Cybernalities is practical, personality-to-path guidance for technical parents that teaches them to recognize their kids’ interests, activities, and natural tendencies as cybersecurity soft skills.
I show how to match those soft skills and interests with 8 cybersecurity paths and turn what they do naturally into safe, responsible, hands‑on projects. The result: parents taking steps to raise kids who can solve problems, create tech, stay safe online, and keep doors open for any future, not just tech.
Parents enjoy quality time while learning about their child. This type of early play together is proven to provide families with stronger bonds and trust, better communication, and more empathy toward each other.
Young adults who learned by playing with parents have better social skills, mood control, and problem-solving skills, creating less stress, because play taught them to calm down and failing felt like feedback. They also learn a healthier sense for risk and choose safer choi
Angie Garey
Angie Garey is a Senior Systems Engineer and the founder of the Wisconsin chapter of Women in Cybersecurity. With a background in technology sales along with usage and implementation of small business technology across many industries, she pursued a cybersecurity degree in her 50s starting in January of 2020.
Angie is a proactive, collaborative team player who consistently adds value through cross team support, technical initiative, continuous learning and using indirect authority to change behavior and culture. Her positive relationships across departments, curiosity, initiative, and hands on approach have strengthened governance, improved specific security policies, and standardized operational methods at Northwestern Mutual.
Angie spends quite a bit of her time traveling, especially to Denver where one of her daughters lives and last year spent 3 weeks in and around Italy including Rome, Sicily, Montenegro, and Croatia. She lives in the Madison area on an island.
I vs AI
AI is a friend, but it can be a terrible foe when not properly used. In cybersecurity, we also see AI as an enabler of cyber-criminal activities and security errors. In this talk, we will focus on what you need to know to defend your enterprise against AI-enabled cyberattacks. We will also discuss how to protect yourself and your company against errors caused by the improper use of AI.
Alex Holden
Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in information security and threat intelligence, becoming one of the most recognizable names in its field. Mr. Holden researches minds and techniques of cyber criminals and helps our society to build better defenses against cyber-attacks.
Dismantling the Silo: Integrating GRC and SOC for a Unified Defense
In many organizations, GRC and SOC operate as separate islands, leading to "compliant but insecure" environments. This session explores how to bridge that gap. We will dive into how technical teams can use GRC frameworks to prioritize alerts, and how risk managers can use real-time SOC data to move beyond static spreadsheets. By leveraging the MITRE ATT&CK framework and CVSS scoring, we will map out a strategy to reduce your attack surface through a "limitless" collaborative approach. Attendees will learn how to turn compliance from a checkbox into a proactive security driver.
Nousheen Begum
Nousheen Begum, CISSP, is a cybersecurity leader with over ten years of experience spanning Governance, Risk & Compliance (GRC), Security Operations (SOC), and managed security services. She currently serves as the Vice President of the Women in CyberSecurity (WiCyS) Wisconsin chapter and holds board positions with both the ISC2 Wisconsin and ISACA Milwaukee chapters. After earning her Master of Science in Cybersecurity, Nousheen became a dedicated advocate for professional mentorship and inclusive workforce development, believing that a resilient digital world is built through community awareness long before a breach occurs
“Inside the Wisconsin Cyber Response Team: Real-World Incident Response and Lessons Learned”
The Wisconsin Cyber Response Team (WCRT) plays a critical role in strengthening cybersecurity resilience across the state by providing rapid incident response, threat analysis, and coordinated recovery support for public and private sector organizations. This presentation will offer an overview of WCRT’s mission, structure, and operational capabilities, followed by real-world examples of cyber incidents encountered in Wisconsin.
Attendees will gain insight into common attack vectors, response strategies, and lessons learned from actual engagements, including ransomware, business email compromise, and infrastructure-targeted threats. The session will also highlight best practices for preparation, detection, and collaboration with state-level cyber resources. By examining these cases, participants will leave with a clearer understanding of how coordinated response efforts can reduce impact, accelerate recovery, and improve overall cyber readiness.
Benjamin Dumke, Jeff Marshall, Sadie O'Brien
Panelist - Benjamin Dumke is the Senior Network & Systems Manager at Lawrence University in Appleton, Wisconsin, where he leads the Operations Team supporting faculty, staff, and students. Prior to transitioning to higher education, Ben spent more than 20 years in K–12 IT, managing Microsoft technologies, infrastructure, and district-wide systems while navigating the evolving cybersecurity landscape in schools. He has contributed to national K–12 cybersecurity initiatives through his work with K12SIX, helping develop their Incident Response Runbook and Essential Cybersecurity Protections guidance. Ben serves on the boards of WiscNet and AITP - Wisconsin, and volunteers as an Incident Response Lead with the Wisconsin Cyber Response Team. He has presented at BrainStormK20, WiscNet events, the Wisconsin Governor’s Cybersecurity Summit, and the Midwest Management Summit.
Panelist - Jeff Marshall is an accomplished IT executive and technology leader with over 20 years of experience aligning technology strategy with business objectives. As Director of Technology at VJS Construction Services, Jeff drives digital transformation, oversees enterprise systems, and ensures the organization’s technology capabilities deliver measurable business value. Jeff is also active in the professional technology community, serving as a member and board member of the Wisconsin Cyber Response Team, InfraGard Wisconsin, WI Association of IT Professionals (AITP). His commitment to continuous learning and professional excellence is reflected in a range of advanced credentials, including CompTIA CySA+, Security+, SecurityX, ISC2 – Certified in Cybersecurity, and a certified FEMA Cyber Incident Responder In recognition of his leadership and innovation in technology management, Jeff was a 2025 Wisconsin CIO of the Year ORBIE Award Finalist.
Panelist - Sadie O’Brien is a seasoned IT leader driving enterprise technology strategy, cybersecurity, and digital transformation. She currently serves as Director of Information Technology for the Little Chute Area School District, where she leads initiatives that align technology with organizational goals and enhance operational efficiency. Throughout her career, Sadie has built and managed secure, scalable infrastructure, led complex projects, and guided teams through evolving technology landscapes. Known for her strategic mindset and collaborative leadership style, she is passionate about leveraging technology to deliver meaningful, mission-driven outcomes.
Moderator - Amanda Kollmorgan is the Deputy State IT Director for the Wisconsin Department of Military Affairs. Amanda is passionate about developing people-first teams, mentoring future leaders, and fostering innovation through collaborative leadership. With nearly 20 years of military and civilian experience, she brings a well-rounded expertise in cybersecurity and IT strategy.
A Security Engineers Guide to the Galaxy: Tradecraft and Transformation
A view into the history and current state of Cybersecurity from the perspective of a Security Engineer. The evolution of security toolset design over the years has had a major impact on security program design. Drawing from my experience, we will look at some examples that have become foundational for the modern cybersecurity program, the architectures used and how those capabilities and limitations shaped the security programs we built around them. Then we will consider what is changing in toolset architecture, the key properties indicative of a truly new generation of toolsets, and how it impacts our operational patterns.
What skills were critical for us to be successful with legacy "Next-Gen" tools? What thought process changes will enable us to be successful with the new AI generation of protections? What sort of mindset changes will we need to make? I'll strive to answer these questions and make the case there is room for optimism in this space.
Sage Anthony
Sage has 20 years of experience working in IT with 15 of those in security focused roles. Entering the security space from the infrastructure side of IT, he brings a pragmatic perspective that emphasizes resiliency and quality. Currently working at Check Point as a Sales Engineer, he also spent some time as Solution Architect for some local value-added resellers, but the majority of his IT journey has been through various Security Engineering roles within the Manufacturing and Insurance industries.
He has collected many certifications over the years, including: CISSP, CCSP, CEH, CCNP, MCSE, MCITP, NSE4/5, PCNSE, CCSA, CCSM, etc… But will be the first to tell you not to be too impressed by anyone's Cert list. A firm believer that it is better to pursue excellence than recognition.
From Clinics to Casinos: Vulnerability Management in Practice
Vulnerability management in resource‑constrained environments requires creativity, flexibility, and strong information‑sharing networks. In this talk, Em Carlson shares lessons learned from building and supporting vulnerability and patch management programs across public health and tribal gaming, two highly regulated sectors with very different threat profiles.
Drawing on experience coordinating patch management in underfunded public health environments and leading vulnerability management efforts in tribal gaming, this session examines how funding limitations, data scope, and ransomware risk influence security priorities. Em highlights practical strategies for working effectively with limited tooling, documenting sustainable processes, and using community and information‑sharing networks to strengthen security outcomes. Rather than focusing on ideal‑state frameworks, this talk centers on realistic, achievable approaches that security practitioners can apply immediately.
Em Carlson
Em Carlson is a cybersecurity engineer specializing in threat hunting, vulnerability management, and risk-based security operations. With experience spanning public health and tribal gaming environments, she has supported organizations with diverse risk profiles, regulatory requirements, and business needs. This background informs a people‑centered approach to cybersecurity that emphasizes sustainable risk reduction and the practical implementation of security controls. Em is passionate about building resilient security programs through strong communication, thoughtful risk prioritization, and continuous improvement. She enjoys bridging the gap between technical security work and organizational culture to help teams respond effectively to evolving threats. When she isn’t digging into the latest cyber threat Em loves to crochet and listen to audiobooks.
Introduction to Meshtastic
Meshtastic describes itself as “Off-Grid Communication For Everyone”. It’s a communication platform that uses the radio signal technology LoRa, or Long Range, creates a mesh network that lets anyone with a device communicate. Security nerds love interesting and hackable technologies.
Meshtastic leverages low power, low cost radios to create a network of devices capable of working over tens of miles, depending on how many nodes are in the network. There are some interesting security problems that have to be solved when you have an open network like this, but security isn’t the primary consideration.
This talk will explain how Meshtastic works. Show off a bunch of hardware devices. Explain some of the interesting security challenges and solutions. And hopefully inspire you to join the network, learn something new, and start hacking.
Josh Bressers
Josh Bressers is the Vice President of Security at Anchore, where he guides security features and serves as a public evangelist on topics like compliance, open source, and software supply chain security. With a career spanning over 20 years, Josh has a deep-rooted history in the open-source security community. Prior to Anchore, he built the product security team at Elastic and was an early member of the Red Hat Security Response Team, where he later founded the Product Security Team. Josh is a passionate contributor to the security community, he hosts both the "Open Source Security Podcast" and the "Hacker History Podcast."
Practical ICS/OT offense & defense
Many ideas around defending ICS/OT systems are based on outdated approaches. Ask a Controls Engineer to break a system, and you'll get a very different perspective than the prevailing ideas. In this talk, we'll zoom out and discuss the role of safety systems, how systems are actually designed, and what can make for a bad day. By applying an engineering filter to ICS/OT cybersecurity, we can design more defensible environments.
Neil Brandon
Neil is a Principal Engineer for Faith Technologies, where he works as a controls contractor for data center customers. Prior to working in data centers, he spent 15+ years as a system integrator in the food, packaging, paper, and automotive industries. A programmer by specialization, he works on niche projects as a side gig for the automotive and medical industries.
The Cybersecurity ROI Crisis – Why Offense Is the Ultimate Game Changer
Global cybersecurity spending is projected to exceed $377 billion by 2028, yet cybercrime costs still reach $10.5 trillion annually and 87% of organizations suffered a breach in the past year. The reactive, defense-only approach is yielding poor ROI.
This talk makes the case for a different strategy: managed offensive security. Instead of waiting for the next attack, organizations must start hacking themselves—continuously testing and fortifying systems to find weaknesses before adversaries do. We'll explore how proactive operations like continuous penetration testing, red teaming, and attack surface management can directly stop attackers, backed by hard evidence: every $1 spent on pen testing saves up to $10 in breach costs.
This talk challenges cybersecurity dogma and offers a bold blueprint for reallocating a portion of defensive budgets into high-impact offensive initiatives—delivering real risk reduction, better ROI, and a much-needed shift in favor of defenders in 2026.
Jason Rowland
Jason Rowland is a cybersecurity leader with over 20 years of experience across both defensive and offensive security. He began his career on the defensive front lines—building Security Operations Centers, leading incident response at Fortune 500 companies, and shaping SOC strategy at IBM Consulting.
Over the past decade, Jason has shifted to the offensive side, leading some of the largest and most advanced offensive security capabilities in the United States. This dual perspective as both defender and attacker gives him a rare vantage point into the shortcomings of traditional, reactive security approaches.
Jason brings these insights to the stage, offering candid commentary on why legacy defensive models struggle to deliver ROI and how managed offensive security can truly disrupt adversaries. His passion lies in challenging conventional wisdom and equipping boards, CISOs, and security leaders with bold new ways of thinking that can materially change the cybersecurity equation.
Think Like an Attacker, Code Like a Defender: Applying AppSec in the SDLC
Quite often in the Application Security world we hear “Think Like an Attacker”, but what does this mean in the day-to-day? How can this mindset help security analysts better assess vulnerabilities, understand risk in new features, and inject in the SDLC? Further, how can that security phrase translate to help developers write secure code through practical steps?
Let’s step from reactionary to preventative and explore how this concept translates to secure software development. We’ll begin by laying the foundation of what is means to Think Like An Attacker – for both Security and Software Developers. With day-to-day examples and methods of utilizing this mindset.
From there we will explore why this saying is still relevant today, the common pitfalls associated with it, and how to champion secure code development your developers won’t hate by “Coding Like a Defender”. Join me to learn how instilling this mindset can help set your AppSec program up for success!
Hannah Williams
Hannah is an Application Security Engineer, who has spent the past four years working in this field. AppSec was a perfect intersection between her Computer Science major, Cyber Security concentration, & Management minor. She enjoys making AppSec approachable, practical, and collaborative.
In her day-to-day Hannah works within her team to triage app level vulnerabilities across a growing landscape, improve coding practices, and implement complex security solutions to reduce risk. Collaborating with others and teaching Application Security concepts is a highlight for her. She is especially interested in Web Application Penetration Testing, obtaining her eWPT in 2025, and the perspective this can bring to an AppSec program.