
may 15, 2025
Data Security Summit: Dallas
2ND EDITION | Dallas, TX
On Demand August 16, 2024
Event Overview
The rise of sophisticated cyber threats demands advanced defenses to safeguard critical systems and data.
At the same time, security leaders are meeting the moment with state-of-the-art countermeasures against these expanding dangers. The 2025 Dallas Cybersecurity Summit equips attendees with the strategies and tools to combat these challenges and secure their organizations.Â
This year’s summit explores the defining challenges facing infosec leaders at the forefront of data security, including securing machine identities, addressing vulnerabilities in AI-generated code, and protecting cloud platforms within robust data frameworks. Sessions will also cover managing expanding attack surfaces, complying with the Texas Data Privacy and Security Act (TDPSA), and leveraging behavioral analytics to mitigate insider threats.Â
Discover practical strategies for enhanced detection methods, proactive threat-hunting, and defenses against ransomware and AI-enabled attacks. Sector-specific discussions will address safeguarding operational technology (OT) in industries like oil and gas.Â
The summit emphasizes innovation through AI-powered infrastructure, data decoupling for privacy, and lessons from recent high-profile breaches. Join top experts to explore cutting-edge solutions, foster collaboration, and drive secure innovation in a rapidly shifting threat environment.Â
View our ISMG Event Experience video to see what your peers are saying about their participation.Â
Highlight Topics
- Data Privacy and Decoupling: Ensuring Compliance and Data Integrity
- Uncovering Insider Threats with Behavioral Analytics
- Managing the Expanding Attack Surface in a Hyper-Connected WorldÂ
- Building a Resilient Data Security Strategy
- Agentic AI and the Future of Autonomy in Security
- A New Era of Data Privacy Compliance in Texas
- Safeguarding Data Across the Oil and Gas Value Chain – From Wellhead to Wallet
- Building Intelligent Data Infrastructure: Unlocking Cross-Industry Potential
Dr. Meghan Hollis-Peel
Greg Tatum
Reynaldo Gonzalez
Bemi S Anjous
Art Harvey
Todd Pauley
Bryce Carter
Everett Bates
Zechariah Akinpelu
Ravikumar Mukkamala
David Ginn
Joseph Berglund
Speakers
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Agenda
Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.
Registration & Breakfast
8:00 AM - 8:45 AM CST
Openng Comments
8:45 AM - 9:00 AM CST
David Ginn
Andre Allen
The CISO's Critical Role in Nurturing Data Security
This session provides practical insights into the strategies, frameworks, and technologies essential for building resilient data security programs.
In today’s environment, CISOs must address emerging challenges, such as securing vast amounts of data generated by IoT devices and ensuring compliance with regional data sovereignty laws. For example, the rise in ransomware attacks targeting healthcare and financial sectors highlights the urgent need for real-time threat detection and robust incident response strategies. This session equips CISOs with actionable approaches to tackle these pressing issues while safeguarding organizational assets.
Key Points:
- Orchestrating Comprehensive Data Protection Measures: Implement robust approaches like end-to-end encryption and role-based access control to maintain the confidentiality and integrity of critical information assets.
- Crafting and Implementing Incident Response and Data Loss Prevention (DLP) Strategies: Utilize advanced threat intelligence and behavior analytics to proactively thwart data breaches and unauthorized disclosures.
- Evaluating and Integrating Emerging Technologies: Leverage innovations such as AI-powered security analytics and blockchain-based data protection to enhance defenses and stay at the forefront of data security advancements.
David Ginn, CISO, Johnson Controls
Andre Allen, CISO, ENGIE North America Inc.Â
Todd Pauley
Stephen Cospolich
Reynaldo Gonzalez
Managing the Expanding Attack Surface in a Hyper-Connected World
- Comprehensive Asset Discovery: How ASM tools provide continuous mapping of external-facing assets, including cloud services and shadow IT, to prevent blind spots, as illustrated in the Sisense and SolarWinds breaches.
- Real-Time Vulnerability Detection: Learn from recent incidents how misconfigurations and unpatched vulnerabilities became entry points for attackers, and how ASM can detect these issues in real-time.
- Risk Prioritization and Response Automation: Using machine learning to identify the most critical vulnerabilities and reduce response times, based on insights from breaches where faster detection could have minimized damage.
- Integration with SIEM and SOAR: Explore how ASM tools can seamlessly integrate with broader security systems to enhance real-time threat detection, drawing on lessons learned from recent breaches.
Todd Pauley, CISO, Texas Education Agency
Â
Stephen Cospolich, Managing Director, Cybersecurity Risk Management,
Charles Schwab
Â
Reynaldo Gonzalez, Principal Cybersecurity Architect & Leader, Cummins Inc
Â
Zechariah Akinpelu
Everett Bates
Building a Resilient Data Security Strategy
- Layered Defenses for Complex Systems: Designing multi-faceted protection strategies that secure the data lifecycle across distributed infrastructures.
- AI-Powered Anomaly Detection: Applying advanced algorithms to identify unusual activity, prevent breaches, and mitigate evolving threats.
- Next-Generation Access Controls: Enforcing least-privilege policies with dynamic authentication tailored to hybrid and cloud-native environments.
- Proactive Compliance Strategies: Meeting evolving mandates like GDPR and HIPAA while building trust with stakeholders and customers.
Zechariah Akinpelu, CISO, Unity Bank Plc
Everett Bates, Head of Information Security, Crunchyroll
Joseph Berglund
Kevin Dunn
Data Privacy and Decoupling: Ensuring Compliance and Data Integrity
- Decoupling Data for Privacy: Strategies to separate sensitive data for improved security and regulatory compliance.
- Adapting to New Privacy Regulations: How businesses can adjust data architecture to stay compliant with global data privacy laws.
- Minimizing Data Breach Risks: Best practices for protecting sensitive information and reducing data breach impacts.
- Case Studies on Data Decoupling: Real-world examples of how companies have implemented data decoupling to protect data privacy.
Joseph Berglund, Director of IT Operations & Cybersecurity, USME
Services Center
Kevin Dunn, SVP, CISO, U.S. Retirement & Benefits Partner
Ravikumar Mukkamala
Bryce Carter
Agentic AI and the Future of Autonomy in Security
- Understand how agentic AI differs from previous waves of AI and its implications for business operations and security.
- Explore strategies for securely integrating autonomous agents into critical workflows.
- Identify emerging vulnerabilities posed by agentic AI and how to mitigate them effectively.
- Discuss ethical and regulatory considerations essential for the responsible deployment of agentic AI.
Ravikumar Mukkamala, Executive Director, Cloud, JPMorgan Chase
Â
Bryce Carter, CISO, City of ArlingtonÂ
Greg Tatum
A New Era of Data Privacy Compliance in Texas
- Texans can now access, correct, delete, and opt out of personal data use. Cybersecurity must implement secure, user-friendly systems that make it easy to fulfil these rights, ensuring smooth compliance.
- “Reasonable” security measures under TDPSA are now a must. This means implementing solid auditing, rapid breach responses, and comprehensive access controls to keep data secure.
- Businesses must provide clear, accessible disclosures about data use. Cybersecurity needs to work hand-in-hand with legal and data teams to ensure transparency in privacy policies and consent practices, keeping them compliant and understandable.
Greg Tatum, CISO, Businesssolver
Connie Devine
Bemi S Anjous
Safeguarding Data Across the Oil and Gas Value Chain - From Wellhead to Wallet
From exploration and production to transportation and refining, the sector handles massive amounts of sensitive data, ranging from seismic surveys to pipeline monitoring systems. Cybercriminals and state-sponsored actors continue to exploit vulnerabilities at every stage of the value chain, often targeting operational technology (OT) systems that were not originally designed with cybersecurity in mind. As incidents like ransomware attacks on pipelines demonstrate, breaches in this sector can have devastating operational, environmental, and economic consequences.
This session will provide a comprehensive exploration of the cybersecurity challenges facing the oil and gas industry. Attendees will learn about vulnerabilities specific to upstream, midstream, and downstream operations, with real-world examples of recent attacks and lessons learned. The panel will discuss strategies for integrating IT and OT security, leveraging advanced threat detection technologies, and protecting the proprietary and operational data that fuels the energy sector.
Discussion Points:
- Key vulnerabilities across upstream, midstream, and downstream oil and gas operations.
- Real-world case studies of cyberattacks on the energy sector and lessons learned.
- Strategies for securing operational technology (OT) systems and bridging IT/OT gaps.
- Best practices for enhancing resilience against nation-state and criminal cyber threats.Â
Connie Devine, VP, IT Security & Audit, Excelerate Energy
Â
Bemi S Anjous, CISO, Noble Corp
Dr. Meghan Hollis-Peel
Nayan Patel
Building Intelligent Data Infrastructure: Unlocking Cross-Industry Potential
From healthcare to financial services, companies must rethink their data management strategies to drive efficiency, security, and innovation. A modern data infrastructure can transform raw data into a powerful resource, optimizing performance and enabling smarter decision-making while safeguarding sensitive information. Whether you’re looking to modernize your data strategy or protect critical assets, this session offers practical insights to help you build a data infrastructure designed to meet the challenges and opportunities ahead.
This session will explore the components of a resilient, secure, and scalable data infrastructure, highlighting how intelligent systems can deliver actionable insights, automate workflows, and meet the growing needs of diverse sectors.
Key topics include:
- Leveraging AI for Efficiency: How intelligent systems can streamline operations and generate insights that lead to better business outcomes.
- Enhancing Security: Approaches for embedding strong security measures directly into your data infrastructure to protect against emerging threats.
- Scalability for the Future: Developing a flexible and adaptable infrastructure capable of evolving with your business needs and handling increasingly complex workloads.
Dr. Meghan Hollis-Peel, Data Management Officer, Texas Department of Licensing and RegulationÂ
Nayan Patel, CIO, Upson Regional Medical Center
Data Security Summit: Dallas
Data Security Summit: Dallas
Trust Undermined: An Immersive Simulation of AI-Augmented Insider Threats
- Precision Threat Response: Master techniques for isolating compromised systems, analyzing hybrid network activity, and mitigating cascading disruptions caused by insider-enabled AI attacks.
- Real-World Scenario Insights: Understand how AI-driven insider threats exploit IT-OT vulnerabilities, with lessons applicable to sectors reliant on interconnected systems.
- Actionable Defense Playbook: Design advanced countermeasures, including micro-segmentation, AI-based anomaly detection, and evidence preservation for incident response and regulatory requirements.
Ginger Armbruster, Chief Privacy Officer and IT Division Director
Â
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
Art Harvey
Uncovering Insider Threats with Behavioral Analytics
- Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
- Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
- Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
- Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.
Art Harvey, CISO, Dovenmuehle
Don’t miss your chance to attend this dynamic impactful event
#ISMGSummit
@ISMG_News
Sponsors








CPE Credits
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
The Summit Experience
Future Events