Why Attend?
The 2025 Palmetto Cyber Conference is the premier gathering for South Carolina’s cybersecurity professionals, innovators, and thought leaders. Taking place on March 17-18, 2025, in Columbia, SC, this two-day event is designed to foster collaboration, drive innovation, and build resilience in the face of today’s most pressing cyber challenges. This year’s theme, “Securing Our Future: Innovation, Resilience, and Collaboration in Cybersecurity,” highlights the critical importance of uniting public and private sectors to safeguard our digital landscape. Attendees will experience a dynamic agenda featuring keynote addresses by renowned experts, panel discussions on cutting-edge topics, and hands-on workshops designed to equip participants with practical strategies for success.
In addition to the engaging sessions, the conference offers unparalleled networking opportunities with industry leaders, government officials, and educators from across the region. Attendees will also have the chance to explore the latest cybersecurity tools and services showcased by top vendors and sponsors. A highlight of the event is the Annual Awards for Excellence in Cybersecurity, celebrating outstanding contributions in industry, government, academia, and leadership. Together, we will reflect on achievements, share insights, and shape the future of cybersecurity in South Carolina and beyond. Don’t miss this opportunity to be part of South Carolina’s most impactful cybersecurity event of the year. Join us at the Palmetto Cyber Conference and help secure our collective future.
Event Schedule
8:00AM
Registration
Registration
9:00AM
Conference Kickoff
Conference Kickoff
9:15AM
Cybersecurity Policy Research Panel

Cybersecurity Policy Research Panel

Lora Pitman
Assistant Professor, Department of Intelligence and Security Studies
The Future of Cyber Threats in the AI Age: What is Going to Keep CISOs Awake at Night?

The Future of Cyber Threats in the AI Age: What is Going to Keep CISOs Awake at Night?

Malleswar Reddy Yerabolu
Malleswar Reddy Yerabolu is an accomplished cybersecurity leader with over 7 years of extensive expertise in vulnerability management, application security, threat intelligence, DevSecOps and AI. As a Sr. Security Engineer at NC DHHS, Malleswar has been instrumental in leading strategic initiatives to enhance cybersecurity frameworks, mitigate risks, and ensure compliance with regulatory standards such as NIST, ISO 27001, and PCI DSS.
With certifications such as CISM and CISA, Malleswar brings a wealth of knowledge in risk assessment, incident response, and secure software development practices. His professional journey includes developing and deploying advanced cybersecurity solutions for global enterprises in sectors like government, finance, and critical infrastructure. Malleswar is proficient in leveraging cutting-edge tools like Qualys, Nessus, Splunk, and IBM QRadar to safeguard systems against evolving cyber threats.
In addition to his technical acumen, Malleswar is passionate about knowledge sharing and community engagement. He has authored comprehensive threat advisory reports and vulnerability assessments, contributing to the cybersecurity knowledge base. His work continues to inspire innovation and drive excellence in the ever-evolving field of cybersecurity.
Defend Against Cyber Attacks with the MS-ISAC

Defend Against Cyber Attacks with the MS-ISAC

Megan Incerto
Megan Incerto is a Regional Engagement Manager for the Multi-State Information Sharing and Analysis Center™ (MS-ISAC®), a division of the Center for Internet Security, Inc.®. Megan manages the MS-ISAC® members in Regions 3 and 4. She works with our nation’s State, Local, Tribal, and Territorial (SLTT) governments including all public entities. The MS-ISAC® provides no-cost and low-cost cybersecurity resources for our members with the goal of strengthening their overall cybersecurity posture and resiliency.
10:05AM
Advancing Women in Cybersecurity


Advancing Women in Cybersecurity

Dee Appleby
Deirdre (Dee) Appleby is an accomplished education and cybersecurity leader with extensive experience in program development, strategic planning, and workforce education. As the President of the South Carolina Affiliate of Women in Cybersecurity (WiCyS), she drives initiatives that recruit, retain, and advance women in the cybersecurity field. With a background in both secondary and post-secondary education, Dee has successfully led cybersecurity training programs, managed federal grants, and developed innovative STEM curricula to expand learning opportunities in technical fields.
Her leadership extends to directing large-scale educational initiatives, including the Magnet School Assistance Program, and serving as an instructor for GenCyber Teacher Camps, where she equips educators with the tools to integrate cybersecurity into their classrooms. Holding multiple advanced degrees and certifications in cybersecurity, education, and administration, Dee is dedicated to fostering diversity in the cyber workforce and empowering the next generation of cybersecurity professionals.

Elaine McLeod
CPT Coordinator and Faculty, Computer Programming Technology, Information Systems Technology department, Midlands Technical College, Columbia, SC
VP, SC Chapter of WiCyS
Faculty Advisor, Skills USA, IST Department, Midlands Technical College
ACUE Certification – Faculty credentialed by ACUE have demonstrated comprehensive knowledge and skills across all of the core teaching competencies defined in ACUE’s effective practice framework.
MA, Information and Resource Management, Webster University
Over 30 years experience in IT
Corporate Lessons Learned from Israel Hezbollah Conflict

Corporate Lessons Learned from Israel Hezbollah Conflict

Neil Khatod
: I joined Hays after 30 years in the US Army. In the Army, I built, operated, and maintained some of the worlds biggest and most critical networks. In my last few years, I switched from solely operating those networks to defending them. My final job prior to joining Hays was Chief Operating Officer of Army Cyber Command.
Strengthening Cyber Resilience Through Effective Governance, Risk Management, and Compliance (GRC)

Strengthening Cyber Resilience Through Effective Governance, Risk Management, and Compliance (GRC)

Shawn Robinson
With over 30 years in telecommunications, network, and security technology, Shawn is a seasoned cybersecurity professional who has dedicated my career to protecting organizations and empowering teams to thrive in an increasingly digital world. He is currently enrolled in the Carnegie Mellon CISO program and hold a B.S in Cybersecurity and an MBA from Western Governor’s University. Shawn also hold several industry certifications to include CISSP, CISA,CISM and PMP. Shawn is the founder of the Charlotte Metro ISC2 chapter. Shawn’s journey started in the U.S. Army, where I developed the discipline, resilience, and strategic insight that has guided me through complex challenges in both public and private sectors.
Shawn currently serves as the Cybersecurity Regulatory & Risk Leader for a leading insurance provider, where he focus on designing, implementing, and overseeing robust regulatory and risk program that safeguard critical assets and sensitive information. Shawn specialize in navigating and aligning with the industry’s most rigorous regulatory standards, including the NYDFS Reg.500 and the NIST Cybersecurity Framework. Shawn is particularly passionate about enhancing cybersecurity maturity and creating security transformations that align seamlessly with business objectives.
Beyond technical expertise, Shawn is an active voice in the cybersecurity community. He produces a series of short, engaging videos on Governance, Risk Management, and Compliance (GRC), aimed at breaking down complex topics and making them accessible to professionals at all levels. Shawn’s goal is to demystify cybersecurity, encouraging broader understanding and proactive engagement within the industry.
Mentorship is central to his personal mission. Shawn is actively engaged in speaking opportunities and networking to support emerging talent, sharing insights I’ve gained from his career to help others build confidence and expertise in the cybersecurity field. Shawn committed to fostering an inclusive community where cybersecurity professionals can learn, grow, and collaborate to face tomorrow’s challenges together
10:35AM
Break
Break
11:05AM
Ensuring Trust: Security, Privacy, and Compliance in AI Systems

Ensuring Trust: Security, Privacy, and Compliance in AI Systems

Anhad Singh
Anhad Singh is a cybersecurity & data privacy leader and holds a PhD in Data Privacy from University of California, Davis. Before starting Styrk AI, Anhad led multiple internal and external privacy initiatives at Google as Sr. Data Privacy Engineer. Prior to Google, he was at Dataguise (acquired in 2020) where he took on many different roles, including designing and building software, Product Management and the Head of Technology and Partnerships. Anhad exemplifies thought leadership across cybersecurity & data privacy through various speaking engagements, webinars, publishings and patent contributions.
TikTok, Data, and Global Security: Unpacking the Controversy

TikTok, Data, and Global Security: Unpacking the Controversy

Sean Fay
Inspector General Sean Fay brings 29 years of law enforcement experience, starting in North Carolina before joining the South Carolina Department of Social Services (SCDSS) through roles at the Myrtle Beach Police Department and the South Carolina Law Enforcement Division (SLED). His diverse career includes work in Patrol, Street Crimes, Crime Prevention, Special Operations, and Traffic. At SLED, he served as the Statewide Automated License Plate Recognition Program Coordinator and Local Agency Security Officer within the Criminal Justice Information Services division, overseeing IT security and federal compliance. In his final role at SLED, he led external engagements for the South Carolina Critical Infrastructure Cybersecurity (SC-CIC) Program, coordinating efforts to secure critical infrastructure, responding to cyber threats, and managing a state and federal cyber taskforce. Additionally, he was a SWAT team member and hostage negotiator.
At SCDSS, IG Fay oversees four key units within the Office of Inspector General:
• Investigations Unit: Conducts criminal investigations into fraud, waste, or abuse involving SCDSS programs.
• Backgrounds Investigations Unit: Protects children through Central Registry checks as well as national, fingerprint-based background checks for foster, adoption, childcare, and group home applicants.
• Emergency Management and Disaster Services Unit: Coordinates disaster response, including sheltering and mass care, with state and federal partners.
• Information Security Division: Safeguards the agency’s critical assets by mitigating cyber threats and ensuring uninterrupted delivery of essential services.
IG Fay holds an associate degree from Methodist University and a bachelor’s degree in business from Baker College (Summa Cum Laude). He is a Certified Ethical Hacker, Certified Network Defense Architect, and Certified Inspector General. A dedicated leader, he formally served as a regional vice president for SC InfraGard and Chair of the State and Local Cyber Grant working group with ATRAC, and as a member of the SC Cybersecurity Ecosystem Coordination Initiative. He is also a Major in the U.S. Army Reserves.
Cyber Security and Critical Infrastructure

Cyber Security and Critical Infrastructure

Jared Chambliss
I am a cybersecurity professional with 17 years of experience in both IT and OT operations and cyber security program management and development within the federal government space. After earning my Masters Degree in computer science from the University of Louisiana @ Lafayette he took his first big boy job working for the Department Of Energy (DOE) National Nuclear Security Administration (NNSA) MOX project in Aiken, SC at the Savannah River Site.
I cut my teeth on systems administration and security management as well as people management while at MOX for over 7 years, rising from analyst to Domain Admin responsible for all things security implementation in an environment with over 2000 users and 200+ servers and managing approximately 15 people
After leaving MOX my focus shifted to program development which is where i really got into cybersecurity. I spent the next 5 years at the Parsons Salt Waste Processing Facility project for DOE Environmental Management (EM) in Aiken, starting as the single cyber person in the engineering department. In that time i developed an Operational Technology cyber program in line with Nist SP 800-82 R2 and implemented the program fully, gaining an Authority to Operate from DOE for that facility. By the time i left that project i was again managing a team of approximately 15 people and had become a Certified CISSP, ISSEP, and ISSMP.
I spent the next 3.5 years back at the NNSA working on the Pu PIT Production project using my cyber skills to advance the nations nuclear deterrence program before coming back home to the EM mission with SRMC, where i currently serve as a contracted IT Program Manager/Technology expert through Boston Government Services.
At BGS my role is Regional Director, Cybersecurity where i maintain a team of 7 experts across the nation doing cyber and IT missions for the DOE along with fostering strategic partnerships and doing business development (in my spare time).
Despite all this, my biggest priority is my relationship with Jesus Chris and my wife of 17 years and my 2 children whom i love dearly. They are the reason i do what i do. Without them i would be nothing. So in my spare time i am a worship leader at Fearless Church Aiken, a small group leader, i play with my kids, hang out with my wife, play video games, and serve as the Chair of the Board of Directors for Horse Creek Academy , a non profit K-12 Charter School in Aiken SC.
11:55AM
Morning Keynote

Morning Keynote

Julius Gamble
Julius Gamble serves as the Regional Director for Region 4 of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). In this role, he leads CISA’s efforts to reduce risk and enhance the cyber and physical resiliency of critical infrastructure throughout the eight southeastern states (AL, FL, GA, KY, MS, NC, SC and TN). He works with public sector partners, such as state, local, tribal, and territorial governments, as well as private-sector organizations essential to the nation’s homeland security. Prior to joining CISA, he served as the assistant deputy chief of staff (G6) for the U.S. Army Forces Command (FORSCOM), where he provided leadership over the command’s IT and cybersecurity operations. He has also held previous leadership positions with DHS, the U.S. Customs and Border Protection and the city of Baltimore. A strong advocate for students seeking cybersecurity careers within the federal government, Gamble has also served as an adjunct faculty member for the University of Maryland’s Global Campus Master of Science in Cybersecurity Technology Program since 2016.
12:45PM
Lunch and Awards of Excellence

Lunch and Awards of Excellence

Thomas Scott
1:35PM
Afternoon Keynote

Afternoon Keynote

Laura Nelson
Laura Nelson joined the National Cryptologic Foundation (NCF) as President and CEO in early 2019. She is leading the Foundation’s growing partnership with the National Security Agency as well the NCF’s Education and Engagement programs. Laura retired from the National Security Agency in 2018 after a 37-year career. For over 15 years, Laura was a member of the Defense Intelligence Senior Executive Service (DISES) where she led multiple technical organizations in a variety of mission areas in both the Signals Intelligence (SIGINT), Information Assurance, and Operations directorates. An energetic leader, Laura has extensive experience in building organizations, recruiting talent, fostering innovation, and developing policies and strategies to execute the mission. She received the Meritorious Presidential Rank Award in 2012. Laura holds a Master of Science in Electrical Engineering from the Johns Hopkins University and a Bachelor of Science in Electrical Engineering from Virginia Tech.
2:25PM
Empowering Cyber Literacy: Leveraging NCF’s Educational Resources for Careers in Cyber

Empowering Cyber Literacy: Leveraging NCF’s Educational Resources for Careers in Cyber

Alisha Jordan
Dr. Alisha Jordan is the Director of Education at the National Cryptologic Foundation (NCF), where she leads educational initiatives that bridge the gap between cybersecurity awareness and workforce development. With a background in urban educational leadership and a passion for enhancing cyber literacy, Dr. Jordan is committed to inspiring the next generation of cybersecurity professionals. She brings over 20 years of experience in education, having worked in various leadership roles across K-12.
Dr. Jordan earned her Doctorate in Urban Educational Leadership from Morgan State University in December 2023. She holds multiple Master’s degrees from the College of Notre Dame, further enhancing her expertise in educational leadership, as well as a Bachelor’s degree in Sociology from Hampton University.
As Director of Education at NCF, Dr. Jordan has spearheaded several key initiatives aimed at increasing cybersecurity awareness and skills among students, educators, and professionals. These include the development of the CyberChats podcast, the Outsmart Cyberthreats Collection, Ambassador Program and Cybersecurity Escape Room programs. She has also managed large-scale events like Cyber Saturdays and partnered with educational institutions across the country to bring cybersecurity education to the forefront of K-12 curricula.
In her role, Dr. Jordan works closely with educators, students, and community leaders to create engaging, hands-on learning experiences that demystify complex cybersecurity topics. Under her leadership, the NCF has expanded its reach, impacting thousands of students and teachers through interactive workshops, curriculum development, and strategic partnerships.
Before joining NCF, Dr. Jordan held leadership roles in various educational organizations, where she focused on educational equity, professional development, and instructional design. Her diverse experiences have made her a respected thought leader in the education sector, particularly in integrating STEM and cybersecurity education.
A lifelong learner, Dr. Jordan is always seeking opportunities to innovate and improve educational practices. She is an advocate for inclusivity in technology and is committed to helping underserved communities gain access to high-quality cybersecurity education and resources. Through her work at NCF, Dr. Jordan continues to shape the future of cybersecurity education, ensuring that it is accessible, engaging, and impactful for all students.
Hidden Risks of Using AI and How To Avoid Them

Hidden Risks of Using AI and How To Avoid Them

Lisa Carter
Lisa Carter is the founder of SpartanTec, Inc, a top technology provider of IT Services across North Carolina and South Carolina. In Cyber Security for more than 20 years, Lisa is quick to point out that for everything that touches an organization’s network, “Security is Key”. In fact, Lisa has always known that she wanted to work in IT security. Armed with a Bachelor in Marketing, and experience selling managed firewalls, she recognized a need in the marketplace and SpartanTec was born.
With more than 23 years under her belt, she now proudly leads a dynamic engineering department and sales team and ensures all SpartanTec clients are handled with the highest quality and professionalism.
A Loris, South Carolina resident, Lisa enjoys reading and hanging out with her husband Chris and their 2 daughters, Kinsey and Lauren.
3:10PM
Break
Break
3:40PM
Cybersecurity is Everyone’s Responsibility: How to Delegate

Cybersecurity is Everyone’s Responsibility: How to Delegate

Howard Globus
Cybersecurity Expert | Creator of The SAFE MatrixTM | Amazon Bestselling Author of “Unhackd”
Howard Globus is a cybersecurity evangelist and creator of The SAFE MatrixTM, a 4-step system designed to “outhack” the hackers and bulletproof small businesses. From starting as a 7-year-old computer prodigy to dedicating his career to protecting small and mid-sized businesses, Howard’s mission has been to safeguard companies from both internal and external data breaches, ensuring confidentiality, integrity, and operational continuity.
As the Amazon bestselling author of “Unhackd”, a practical guide for staying safe online, Howard draws on decades of experience working with everyone from individuals to small businesses and Fortune 100 companies. His deep understanding of the cybersecurity landscape has made him a sought-after expert, featured in Forbes, BAI (serving the financial industry), Gartner/Captera (on AI and Ransomware, Safety Detectives, Mindful Manna Podcast, The Bond Buyer, and as a guest writer for Karjaka.
In addition to his book, Howard is an in-demand keynote speaker who shares his expertise on cybersecurity for businesses, incident response, and the importance of proactive defense
strategies. His insights are invaluable for any journalist covering topics related to financial services, cybersecurity trends, and the risks facing small businesses today. Howard is available for expert commentary on topics including cybersecurity best practices, risk mitigation, incident response, and strategies for small businesses to stay safe in an increasingly digital world.
From Compliance to Resilience: Rethinking Risk in the AI and Cloud Era

From Compliance to Resilience: Rethinking Risk in the AI and Cloud Era

Randall Laudermilk
Randall Laudermilk is the VP of Product Strategy at Carson & SAINT. Randall has over 25 years of experience in professional services and product management, and brings a strategic perspective to solving real world problems we face in cyber security. Randall previously served in the U.S. Air Force and later held a position with the Joint Staff’s Special Operations Division at the Pentagon. Randy has a Masters of Science degree in Information Systems from Marymount University; is a Certified Scrum Master (CSM), Certified Scrum Product Owner (CSPO) and current member of CyberSC.
Bridging the Gap: Overcoming Challenges in Cyber Resilience and Incident Response

Bridging the Gap: Overcoming Challenges in Cyber Resilience and Incident Response

Dr. Keyanne McCray
Dr. Keyanne McCray is a cybersecurity leader with expertise in risk management, compliance, auditing and incident response. With over five years of professional experience, she has helped organizations strengthen their cybersecurity posture through strategic planning, security assessments, and remediation initiatives. In addition to her industry work, she is a dedicated educator, serving as an adjunct professor and mentoring future cybersecurity professionals. A published author, Dr. McCray has written on critical topics such as mobile banking vulnerabilities and cybersecurity challenges. Her work reflects a commitment to advancing cybersecurity practices through education, research, and innovation.
4:30PM
From Risk to Resilience: Building Cybersecurity Strategies that Thrive

From Risk to Resilience: Building Cybersecurity Strategies that Thrive

Patrice Lindo
Patrice Williams-Lindo is not your average consultant. With a career that spans the giants of the consulting world and the innovative edges of startup culture, Patrice brings a unique blend of strategic insight and disruptive thinking to the table. Her background in Organizational Psychology and Instructional Technology is just the beginning – it’s her fearless approach to leadership and transformation that sets her apart. If you’re ready to rethink everything you know about leading in the digital age, Patrice is here to light the fuse.
Mastering AI Security: Safeguarding the Future

Mastering AI Security: Safeguarding the Future

Jason Dion
JASON DION is a globally recognized cybersecurity expert, practitioner, and instructor. With a passion for empowering aspiring professionals, he has assisted over 2 million students across 195 countries to achieve certifications in cybersecurity, information technology service management, and project management.
Jason’s career spans decades of hands-on experience in high-stakes cybersecurity roles. He has served as an Information Systems Officer, Director of a Network Operations and Security Center, and the global lead for cyber defense for U.S. Cyber Command. He has also held the esteemed position of Director of Information Assurance Operations (DIAO) for the National Security Agency, contributing to the protection of critical national infrastructure.
Jason holds a Master of Science in Information Technology, specializing in Information Assurance, as well as a Chief Information Officer (CIO) Graduate Certificate from the National Defense University’s College of Information and Cyberspace.
An avid educator, Jason’s work is driven by his mission to bridge the gap between theoretical knowledge and real-world application. His book, “Mastering Cyber Resilience”, exemplifies this approach, providing readers with actionable insights into mastering one of the most powerful tools in cybersecurity.
What I Wish I Saw When Attacking Your Directory

What I Wish I Saw When Attacking Your Directory

Eric Kuehn
Eric Kuehn is a Principal security consultant at Secure Ideas, where he leverages his extensive experience with Microsoft infrastructures and Active Directory to perform penetration tests and red team assessments. He also teaches a course, Red Team Fundamentals for Active Directory, where he explains the concepts, techniques and best practices for exploiting and defending AD environments. Eric has been working with Active Directory since its release and was the technical leader and architect of one of the largest and most complex AD implementations out there. He holds the CISSP certification and is passionate about sharing his knowledge and skills with others. Eric has delivered talks on Active Directory security and other topics at various conferences, events, webcasts, and Antisyphon Training.
5:30PM
Networking Reception - Hosted by Check Point Software Technologies
Networking Reception - Hosted by Check Point Software Technologies
8:05AM
9:00AM
From Compliance to Competence: How AI Makes Cybersecurity Work Again

From Compliance to Competence: How AI Makes Cybersecurity Work Again

Patrick Wright
Patrick Wright
IT & Cybersecurity Expert, Co-Founder & COO of STP Ventures, LLC
Patrick Wright is a 20-year veteran in IT and cybersecurity, specializing in offensive security and innovative solutions that bridge the gap between compliance and real-world effectiveness. As the CISO and Co-Founder of STP Ventures, LLC, Patrick has spent 15 years leading a team of ethical hackers, delivering cutting-edge cybersecurity services to organizations of all sizes.
A passionate advocate for making cybersecurity accessible, Patrick champions the integration of AI and automation to transform the industry, enabling businesses to adopt proactive, cost-effective security practices. With a strong background in Network Security & Management, he is dedicated to sharing his expertise and reshaping how organizations approach cyber defense.
Offstage, Patrick is a devoted family man who balances his entrepreneurial drive with a commitment to personal growth and discipline. Whether leading a team, mentoring others, or honing his skills in martial arts, Patrick brings a well-rounded and focused approach to everything he does, reflecting the same values he brings to cybersecurity.
9:50AM
Cybersecurity’s Broken Talent Pipeline—And How Apprenticeships Can Fix It

Cybersecurity’s Broken Talent Pipeline—And How Apprenticeships Can Fix It

Will Reed
Will Reed, CISSP is a retired military veteran and seasoned practitioner with over 22 years of experience in the fields of Cybersecurity and Information Technology. With a Bachelor of Science in Network Operations and Security from Western Governors University and over 20 industry-recognized certifications, he has a profound understanding of aligning IT infrastructure and security services with business requirements.
Will’s extensive career spans critical sectors like the Department of Defense, Department of Homeland Security, local government, energy, finance, education, manufacturing, and healthcare – where he has held key roles such as Virtual CISO, Information Security Project Manager, Cyber Security Compliance Lead, and Senior IT Services Director.
Throughout his career, Will has honed his expertise in GRC, security program development, and cybersecurity education. This deep knowledge, combined with his proven track record in leading successful cybersecurity initiatives across complex environments, positions him as a trusted advisor.
As the CEO of the Better Everyday Cyber consulting firm, Will is dedicated to helping businesses achieve better cyber resilience through simple, everyday actions. His firm’s mission is to safeguard the digital landscape, empower the next generation of cybersecurity professionals, and deliver strategic solutions that enhance organizational cybersecurity postures.
Will currently resides near Augusta, Georgia with his wife, Teia, and their five children.
Taming the Copilot: Navigating the Security and Risk Landscape of AI in the Enterprise

Taming the Copilot: Navigating the Security and Risk Landscape of AI in the Enterprise

Daniel Ford
Be Better Today Than You Were Yesterday…
Dr. Daniel Ford, CISO at Jovia Financial Credit Union, isn’t just focused on today’s threats. He believes in constantly evolving, like competing against your future self. This drives him to cultivate a culture of continuous learning at Jovia, ensuring both the organization and its people stay ahead of the curve.
“If you classify yourself as a lifelong learner, you tend to retain 60% – 70% of the knowledge over time,” says Ford. “Additionally, if you classify yourself as a lifelong teacher, you tend to retain 90%+ of the knowledge.”
Dr. Ford’s academic journey began with a BS in Computer Science and blossomed into a Doctor of Science (DSC) in Information Assurance. He further complemented this expertise with an MBA, graduating in the top 20% despite no prior business background. This thirst for knowledge extends beyond academics. He champions lifelong learning within Jovia, mandating training hours and actively seeking talent from underserved communities.
Dr. Ford leads with empathy, fostering an environment that embraces diverse perspectives. His growth mindset extends beyond work. A black belt in another martial art, he’s currently a one stripe blue belt in Brazilian Jiu-Jitsu under Kroyler Gracie, demonstrating his commitment to stepping outside his comfort zone. When not safeguarding Jovia, he distills award-winning spirits at Dragon’s Mouth Distillery and hosts a popular YouTube show.
Dr. Ford’s legacy extends beyond technical expertise, boasting over 20 years of experience at McAfee, Unisys, and other notable organizations. What is Dr. Ford’s greatest achievement? Great question as he doesn’t dwell on past accomplishments; as he says, “you are only as good as what you do next.” However, he measures success by the number of people he has empowered to grow.
Quick Wins with Cyber Kill Chain

Quick Wins with Cyber Kill Chain

Mark Brophy
Mark Brophy is the DFIR Team Lead and Incident Responder for SecurIT360. He has over 20 years of experience in IT/IS and numerous certifications including CISM, CISSP, CNVP, GCIH, GDSA & GSNA. In addition to his work, Mark is also an adjunct faculty member for several local colleges and universities in cybersecurity.
10:20AM
Break
Break
10:45AM
Fireside Chat: Navigating Cyber Threats: Addressing the Hidden Risks in Maritime Transportation

Fireside Chat: Navigating Cyber Threats: Addressing the Hidden Risks in Maritime Transportation

Jamie DeMent
Be Ready: Protecting Microsoft 365 Data from Cyber Attacks

Be Ready: Protecting Microsoft 365 Data from Cyber Attacks

Vanessa Toves
When I was young I wanted to be an architect. As it turns out, I’m a different type of architect. I am a Microsoft 365 Solutions Architect.
NIST Cybersecurity Resources 101

NIST Cybersecurity Resources 101

Victoria Pillitteri
Victoria Yan Pillitteri is a supervisory computer scientist and manager of the Security Engineering and Risk Management Group at the National Institute of Standards and Technology (NIST). The group conducts the research and development of the suite of risk management, systems security engineering, and cybersecurity risk analytics and measurement guidance used for managing cybersecurity risk. She is the co-author of multiple NIST publications that are foundational for cybersecurity risk management, including the security and privacy controls, control assessment procedures, the Risk Management Framework, and the CUI security requirements and assessment procedures (Special Publications (SP) 800-53, SP 800-53A, SP 800-53B, 800-37, 800-171, and 800-171A).
Ms. Pillitteri holds a B.S. in Electrical Engineering from the University of Maryland, a M.S. in Computer Science, with a concentration in Information Assurance, from the George Washington University, completed the Key Executive Leadership Program at American University, and is a Certified Information Systems Security Professional (CISSP).
11:35AM
State of the Cyber Insurance Market 2025

State of the Cyber Insurance Market 2025

Lawrence Baldino
Lawrence “Larry” Baldino is the President of Cyber, Technology and Professional Liability at DUAL North America, a well-established MGU with a presence throughout the United States. Larry is responsible for the growth and development of an emerging SME Cyber risk portfolio that mixes cutting edge technology with traditional underwriting approaches and developing innovative partnerships both in the public space as well as the private space.
Larry has over 22 years of experience in the Cyber, Technology, and Professional Liability space, holding several leadership positions at major Insurance carriers during this time. Larry’s experience includes managing underwriting teams, product management, and cyber services positions.
Larry holds a Bachelor of Arts Degree in Political Science and Economics from Saint Michael’s College in Vermont, as well as a Mater’s Degree in Quantitative Risk Analysis from Rensselaer Polytechnic Institute in Troy, NY. Additionally, Larry holds numerous industry designations including graduating form the Howden Cyber Risk Academy, and is currently pursuing graduate degrees in Cyber Crime and Threat Intelligence both in the U.S. as well as the U.K.
How Proper Risk Management Informs Security Defense

How Proper Risk Management Informs Security Defense

Matthew B. Davis
Matthew B. Davis is the Manager of Information Security and Privacy Consulting at Zaviant, a firm specializing in helping companies reduce risk, avoid fines, and protect their brand by providing privacy, security, and third-party risk program management and development. He has been with Zaviant since 2021.
Matthew has BS and MS degrees from Florida State University and an MS degree in Cybersecurity from the University of Dallas. Matthew is also an Adjunct Faculty member at the University of Dallas, currently designing a new GRC course in the MS Cybersecurity program. He is a Fellow of Information Privacy (FIP), Certified Information Privacy Manager (CIPM), and Certified Information Privacy Professional U.S. (CIPP/US) through the IAPP, Certified Information Systems Auditor (CISA) through ISACA, and a Fellow of Privacy Technology through OneTrust.
Matthew specializes in leading consulting teams for information security and privacy engagements, implementing data privacy technologies, security controls and risk assessment, strategic and tactical planning, as well as virtual CISO services for clients of all sizes. He resides in Charleston, SC with his wife, Amanda and daughter, Kendall.
Behind the Inbox: Unmasking Business Email Compromise and How to Fight Back

Behind the Inbox: Unmasking Business Email Compromise and How to Fight Back

Mike Ward
Mike Ward is an experienced cybersecurity professional specializing in protecting small businesses from evolving cyber threats. With over 20 years of experience in IT and cybersecurity, Mike has a proven track record of educating organizations about the importance of proactive defenses. He is passionate about simplifying complex cybersecurity concepts and empowering businesses to secure their operations.
12:25PM
AI Adoption Management Framework

AI Adoption Management Framework

Donnie Wendt
Dr. Wendt is a cybersecurity researcher with over two decades of experience navigating the security landscape. He is the author of “The Cybersecurity Trinity: AI, Automation, and Active Cyber Defense” and was named among the “Most Expert Leaders in Cybersecurity – 2025” by CIO Business World. He is a vCAIO at WhitegloveAI, where he leads clients in safely and securely adopting AI in alignment with their business objectives. Dr. Wendt retired from Mastercard in 2024, where he was a Principal Security Researcher. In that role, he researched the latest security innovations and threats to drive the long-term security strategy. In addition, Dr. Wendt is an adjunct professor of cybersecurity at Utica University.
Dr. Wendt’s certifications include CISSP (Certified Information Systems Security Professional) and AIGP (Artificial Intelligence Governance Professional). He earned a Doctorate in Computer Science with a concentration in Information Security from Colorado Technical University. He also holds a Master’s in Cybersecurity from Utica University.
Disorganized Noize: Data Governance

Disorganized Noize: Data Governance

Charles Lakes II
Charles is a technical speaker and low-code advocate with a pro-code background, specializing in transforming business data architecture. Passionate about innovation, he shares his expertise to solve complex problems and engineer creative solutions. Charles guides organizations in reimagining legacy processes, optimizing AI, BI, and automation initiatives, streamlining operations, and reducing infrastructure costs.
| Software Engineer Plus Ultra | Soufside
FBI Speaker
FBI Speaker
SSA Lee Rankin
1:15PM
End of Conference
End of Conference
1:30PM
Leadership in the Age of AI: Finding Meaning and Resilience in Cybersecurity Strategies”

Leadership in the Age of AI: Finding Meaning and Resilience in Cybersecurity Strategies”

John Dentico Ed. D., AIMP
Dr. John Dentico is a distinguished thought leader in leadership impact, strategic thinking, and the ethical integration of Artificial Intelligence into organizational practices. With over 30 years of experience, Dr. Dentico has dedicated his career to helping leaders navigate complexity and build purpose-driven organizations where meaning becomes the ultimate currency. His groundbreaking approach emphasizes the alignment of leadership actions with organizational values to foster innovation, adaptability, and long-term growth in today’s ever-changing world.
As the creator of the TSWG Strategic Thinking Method and the LeadSimm Leadership Impact Simulation Method, Dr. Dentico provides leaders with innovative tools to tackle modern challenges. The LeadSimm method, a groundbreaking simulation-based training system, immerses participants in realistic scenarios to enhance decision-making and strategic thinking under pressure. He holds the prestigious AI Management Professional (AIMP) certification, showcasing his ability to blend cutting-edge AI strategies with human-centered leadership principles. His work ensures that leaders maintain a balance between technological innovation and meaningful human connection, offering a path forward in the age of AI.
Dr. Dentico is also the award-winning author of Throttle Up: How to Accelerate the Impact of 21st Century Leadership, a guide that inspires leaders to take actionable steps toward creating environments of collaboration and purpose. As the host of the popular Throttle Up Leadership Podcast, he delivers thought-provoking discussions and insights on topics such as the future of work, ethical AI integration, and the power of strategic thinking.
Guided by his personal slogan, Leadership is Action, Dr. Dentico’s work inspires leaders to go beyond traditional leadership development and focus on measurable impact. His philosophy of meaning as the new money challenges leaders to rethink how they approach engagement, retention, and organizational success.
Whether cultivating cultures of purpose, enhancing strategic thinking capabilities, or helping organizations navigate the opportunities of AI, Dr. Dentico equips leaders with the tools they need to thrive. His mission is clear: to help leaders create purposeful, innovative futures where technology and humanity coexist harmoniously.
A NIST Cyber Framework for Everyone. Presenting CSF 2.0

A NIST Cyber Framework for Everyone. Presenting CSF 2.0

Barry Hudson
After 40 years in the Federal IT and Cybersecurity workforce, I have finally had time to reflect on what would have made better prepared to face the challenges in my career. My newly discovered energy is to encourage college and high school students to enter the Cybersecurity family. I am an Adjunct Professor of Cybersecurity at the University of South Carolina Aiken, and independent contractor and lecturer.
Elevate Risk Governance to Maximize Resilience

Elevate Risk Governance to Maximize Resilience

Keyaan Williams
Keyaan J. Williams is the Founder and Managing Director of CLASS-LLC, a professional services firm that delivers governance, risk, privacy, and cybersecurity solutions to critical industries and government agencies throughout the world. Prior to CLASS-LLC, he managed large security programs at the U.S. Centers for Disease Control and Prevention (CDC). A founding member of the Private Directors Association Atlanta Chapter, he currently serves as the chair of the Cyber Strategy Retreat Advisory Board, chair of risk committee for a global non-profit, and strategic advisor for start-ups and early-stage organizations. In addition to public speaking and standup comedy, the record of his knowledge and experience is available in books and publications such as the Certified CISO Body of Knowledge, The Language of Cybersecurity, Using Security Metrics to Drive Action, CISO Magazine, the ISSA Journal, and the Crisis Response Journal.
3:00PM
Transformation Blueprint for Developer-Centric App and API Security

Transformation Blueprint for Developer-Centric App and API Security

Larry Maccherone
Larry Maccherone is a DevSecOps/Shift-Left/Dev-centric Security and Development improvement pioneer.
At Comcast, Larry launched and scaled the DevSecOps Transformation program over five years by safely empowering 600 development teams to take ownership of the security of their products. Larry was a founding Director at Carnegie Mellon’s CyLab, researching cybersecurity and software engineering. While there, he co-led the launch of the DHS-funded Build-Security-In initiative. Larry has also served as Principal Investigator for the NSA’s Code Assessment Methodology Project, which wrote the book on evaluating application security tools and received the Department of Energy’s Los Alamos National Labs Fellow award.
Larry firmly believes in learning by doing so in his spare time; he is the author of a dozen open source projects, one of which gets a million downloads per month.
Contact Larry on his LinkedIn page: https://LinkedIn.com/in/LarryMaccherone
API Underworld: Red Team Hacking Secrets

API Underworld: Red Team Hacking Secrets

Parth Shukla
Parth Shukla is a dedicated Cybersecurity Analyst at Cequence Security with a strong passion for Web Application Security. He is an accomplished bug hunter, community builder, and cybersecurity enthusiast with a relentless drive to uncover vulnerabilities and share knowledge. Parth’s work focuses on securing modern web applications by addressing critical threats like those outlined in the OWASP API Top 10, including BOLA, SSRF, and Broken User Authentication.
In addition to his professional achievements, Parth has mentored over 600 aspiring cybersecurity professionals, empowering them with skills in ethical hacking, bug bounty hunting, and advanced web application testing. An advocate for continuous learning and collaboration, Parth is a frequent speaker at leading cybersecurity conferences worldwide. Guided by the principle that “security is a myth,” he strives to challenge assumptions and push the boundaries of what’s possible in cybersecurity.
Copilot Unlocked: SMB Readiness Workshop

Copilot Unlocked: SMB Readiness Workshop

Lisa Carter
Lisa Carter is the founder of SpartanTec, Inc, a top technology provider of IT Services across North Carolina and South Carolina. In Cyber Security for more than 20 years, Lisa is quick to point out that for everything that touches an organization’s network, “Security is Key”. In fact, Lisa has always known that she wanted to work in IT security. Armed with a Bachelor in Marketing, and experience selling managed firewalls, she recognized a need in the marketplace and SpartanTec was born.
With more than 23 years under her belt, she now proudly leads a dynamic engineering department and sales team and ensures all SpartanTec clients are handled with the highest quality and professionalism.
A Loris, South Carolina resident, Lisa enjoys reading and hanging out with her husband Chris and their 2 daughters, Kinsey and Lauren.
Event Sponsors

















Why Sponsor?

- 0+
Social Media Followers
Boost visibility through thousands of yearly views on our platform. - 0+
Pageviews/Yr
Boost visibility through thousands of yearly views on our platform. - 0+
Avg Attendance
Connect with hundreds of cybersecurity, AI, and data science professionals. - 0+
Newsletter Subscribers
Reach decision-makers directly through our growing, targeted email newsletter list.
Company Footprint
Who you'll reach
Conference Partners
Partner with the 2025 Palmetto Cyber Conference to demonstrate your dedication to advancing regional cybersecurity. By aligning with us, you showcase your commitment to strengthening security efforts across South Carolina, while gaining visibility and forging valuable connections within the cybersecurity community.
Become a Partner today
Keynote Speakers
We are proud to present a powerhouse lineup of speakers for the 2025 Palmetto Cyber Conference, each recognized as a leader in the cybersecurity space. This group includes senior government officials, top industry executives, leading researchers, and frontline practitioners who are shaping the future of security.
Together, they bring a wide range of perspectives—from policymaking and operational defense to academic research and emerging technologies. Attendees will gain firsthand access to the latest developments, tested strategies, and actionable insights drawn from real-world experience.
Through keynote sessions and focused discussions, these experts will explore today’s most urgent cybersecurity challenges and share forward-thinking solutions that can be applied across industries. Whether you’re protecting critical infrastructure, managing enterprise risk, or driving innovation, the knowledge shared here will be directly relevant to your work.
Don’t miss this opportunity to learn from those driving the conversation in cybersecurity. The 2025 Palmetto Cyber Conference is your chance to hear from the best, expand your perspective, and walk away with strategies you can use right away.












































































Hotel Information
We’re glad you can join us for 2025 Palmetto Cyber Conference. We have a room block reserved at Hampton Inn Columbia I-26/Harbison Blvd. for March 16, 2025 through March 18, 2025. Booking your room is simple, just select “Book a Room” to receive your group’s preferred rate. We’re looking forward to seeing you in March! We hope you enjoy your stay and your group’s event!
Event Date
Cooperative Conference Center
-
169 Laurelhurst Avenue, Columbia, SC 29212