2025 Secure Carolinas Conference

Back to Events
Why Attend
Agenda
Sponsors
Partners
Speakers
Hotel Info

Why Attend?

Attending the 2025 Secure Carolinas Conference in Raleigh is your opportunity to network with top cybersecurity professionals, gain insights into emerging threats, and learn actionable strategies to protect critical systems. With expert-led sessions, hands-on workshops, and cutting-edge solutions, this conference empowers you to stay ahead in the ever-evolving world of cybersecurity.

Event Schedule

Room 2 - AI Track
→ 1 hour

Why do security pros and teams fail, and what can you do about it?

Why do cybersecurity and tech professionals (and their teams) fail? As a Michigan Government agency CIO, and enterprise-wide CISO, CTO and CSO, Dan Lohrmann has been studying this question for years – and built and managed many award-winning government teams. Conventional wisdom says we need more staff training and technical security certifications. Others say higher salaries, a better understanding of the bad guys, more executive leadership training or more top-level executive buy-in are needed. While all of these certainly help, I've seen security and technology staff with all of the above fail. This training is based on the award-winning series of articles written for CSO Magazine and ComputerWorld Magazine entitled: Why security pros fail (and what to do about it).
Keynote Speaker
Dan Lohrmann
Read More
Room 2 - AI Track
→ 1 hour

Cyber USA Panel: Strengthening America’s Cyber Ecosystem Through State Collaboration

The CyberUSA Alliance—representing a nationwide network of state and regional cybersecurity organizations—brings together leaders from across the country to accelerate collaboration, workforce development, and resilience in the cyber ecosystem. This panel, moderated by Adam Rak, Executive Director of CyberUSA, will feature leaders from CyberUSA affiliates in North Carolina, South Carolina, and Wyoming to discuss how their states are advancing cybersecurity readiness, education, and innovation through public-private partnerships. Panelists will explore how locally driven collaboration fuels national impact, highlighting successful models of regional cooperation, cyber workforce pipelines, and community engagement. Attendees will gain insights into how states of diverse scale and context—spanning the Carolinas to the Mountain West—are tackling shared challenges such as small business protection, critical infrastructure resilience, and workforce development.
Keynote Speaker
Laura Baker
Keynote Speaker
Brooks Raiford
Keynote Speaker
Adam Rak
Keynote Speaker
Tom Scott
Read More
Room 2 - AI Track
→ 45 mins

Cyber Resiliency Transformation in an Evolving World

Data resilience is essential for modern industries, ensuring access to reliable information that powers automation, innovation, and smart decisions. As digital systems grow more complex, cybersecurity becomes critical—especially with AI's reliance on trusted data. Threats like ransomware and system failures highlight the need to protect data throughout its lifecycle. Without recoverable data, an organization’s ability to bounce back is at serious risk. Let’s explore how you can strengthen your data strategy and stay ahead of the risks
Keynote Speaker
Ric Halsaver
Read More
Room 2 - AI Track
→ 1 hour, 15 mins

Threatscape 2025: Navigating the New Age of Cyber Adversaries

In today's hyperconnected world, cybersecurity threats are more sophisticated, persistent, and disruptive than ever. This session will provide a focused briefing on the current threat landscape, with real-world examples of nation-state and criminal activity, phishing trends, ransomware tactics, and emerging risks targeting both the public and private sector. Attendees will gain actionable insights into adversary tactics, techniques, and procedures (TTPs), and learn practical strategies for strengthening organizational resilience against evolving cyber threats
Keynote Speaker
Rob Main
Read More
Room 2 - AI Track
→ 30 mins

Including AI risks as part of Business Risk Assessments

The use of Artificial Intelligence (AI), Machine Learning (ML) and Large Language Models (LLMs) is on the rise, like no other single technological advancement since the internet. However, as with any advanced technology, it can be exploited by bad actors to steal intellectual property and customer data and create severe impacts to public and private sector operations. In this talk, we will discuss the current state of AI adoption, highlight recent examples of AI-enabled attacks, and provide sources and best practices used across public and private sector organizations to build programs designed to defend against AI-enabled attacks.
Keynote Speaker
Randall Laudermilk
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Harnessing Expertise of Cybersecurity Volunteers to Protect Nonprofits

Nonprofit organizations, vital to serving our communities, often face significant risk with cybersecurity threats due to lack of technical expertise and tools to protect themselves. Apparo helps mitigate that risk with public-private partnerships leveraging the expertise of cybersecurity professionals, as skilled volunteers, to help nonprofits shore up their cybersecurity defenses. Our cohort model, underwritten by corporate partners such as Bank of America and Cox Enterprises, positions skilled cybersecurity mavens to play a crucial role in empowering nonprofits with knowledge and tools to safeguard sensitive data, operate more securely, and protect against cyber-attacks. Learn how easy it is to share your expertise, improve the cybersecurity stance of nonprofits, and have a significant impact on the community. We will discuss the benefits of our model to both nonprofits and skilled corporate volunteers and share compelling outcomes and feedback from past participants.
Keynote Speaker
Jennifer Ray
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Preparing for Quantum: How does quantum affect me?

Quantum computing is no longer a distant innovation—it’s an accelerating reality with the potential to disrupt encryption, our security, and competitive advantage. Yet many organizations are overwhelmed, navigating ransomware, AI adoption, and shifting regulatory landscapes, all at once. This is the first time in history we are not afforded the luxury of sequential transitions between technologies—quantum, AI, and next-gen cyber threats are converging in the same era. In this session: • What is the threat? How does it affect me? • Rumors – don’t I have time? What is the rush? • Do the prework before engaging consultants and vendors • Prepare your workforce—even if you never deploy quantum technologies • Cut through vendor confusion and avoid common readiness traps • Understand the stakes of falling behind Whether you're leading a federal mission, managing critical infrastructure, or driving enterprise tech strategy, quantum isn't just coming—it’s already influencing decisions.
Keynote Speaker
Yolanda Reid
Read More
Room 2 - AI Track
→ 30 mins

Building a Culture of Security: AWS's Blueprint for Success

Summary of your session’s content and objectives: In this session, we will explore how AWS has cultivated a security-first mindset that permeates every aspect of the organization. While technical security measures are essential, true success lies in the people and culture that drive security excellence. Discover how AWS's culture of security has become a core differentiator, setting us apart from competitors and earning the trust of millions of customers, including the most security-sensitive organizations. We'll delve into the principles and practices that have enabled AWS to maintain this security-first approach since Day One, and how you can adapt and scale these lessons within your own organization. Whether you're a security professional, IT leader, or business executive, this session will provide valuable insights into how a strong security culture can accelerate innovation, drive growth, and build lasting customer trust.
Keynote Speaker
Nick Miller
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Cyber Resilience Through Education: Building a Security-Aware Workforce

Technology alone cannot defend against cyber threats—the workforce must be engaged as a proactive line of defense. Yet most training overlooks everyday processes, like financial operations or HR data handling, that are just as vulnerable as phishing or malware attacks. This session presents a holistic approach to workforce education, combining role-specific training, scenario-based exercises, and culture-driven awareness programs. Attendees will learn how to move beyond “check-the-box” compliance to foster an environment where employees across all functions recognize and respond to risks. The result: a stronger, more resilient security culture that scales across the enterprise.
Keynote Speaker
Nishanth Sirikonda
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

The Hidden Security Risks You Can’t Afford to Ignore

AI can save time and boost productivity—but it also introduces new security, compliance, and reputational risks that many firms overlook. In this eye-opening session, you’ll learn where AI puts your client data at risk, how emerging regulations will change your responsibilities, and what steps you can take today to stay compliant. Walk away with real-world case studies, and an action plan to protect your firm while reaping AI’s benefits.
Keynote Speaker
Lisa Carter
Read More
Room 2 - AI Track
→ 30 mins

Black Box, Red Flags: Uncovering Hidden Risks in AI Systems

Artificial intelligence is helping businesses move faster — but what happens when we don’t fully understand how it works? This session breaks down the risks of using AI systems that are too complex to explain. You’ll learn how these “black box” models can lead to biased decisions, errors, and compliance issues — and what steps companies can take to spot warning signs and stay in control. Whether you’re in IT, compliance, or leadership, this talk will help you better manage the risks of AI in your organization.
Keynote Speaker
Markel Samuel
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Classroom-Based Workforce Development: Merging Theory, Concepts, and Experiential Knowledge

What can you accomplish in 10 weeks to prepare college students for a future in Cybersecurity? Using a hybrid course-based curriculum with labs, field trips, expert speakers, and certification training, the University of South Carolina Aiken, SC State, and Department of Energy have made significant strides. In this presentation, former students will highlight the growth and success through this summer program focused on encouraging students to enter the Federal Cyber Workforce. The highly selective program brings together 20 students from universities nationwide to participate in the internship. Students leave the program with 12 transferable college credits, an opportunity to sit for two certification exams, and a solid foundation in cyber fundamentals via coursework and exposure to real-world challenges. Program benefits also include a $6,000 stipend, lodging on campus, and invaluable connections in the workforce and with students from other universities.
Keynote Speaker
Sahvante Leach
Keynote Speaker
Barry Hudson
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

From Concert Hall to Code Review, Symphony to Software

As a professional violinist turned developer, I have worked in two high-stakes, deeply collaborative environments. I even held 2 full-time jobs: as a section violinist in a symphony and as a developer building applications for a Top3 Consulting Firm. Now, as a full-time developer at Georgetown University, I find time to play with the Baltimore Symphony Orchestra. Success isn’t just about individual skill, it’s about how people work together. We’ll explore: - how the best musicians and developers actively listen and respond, whether in a live performance or a sprint planning meeting. - Why an orchestra can perform concerts without a single word and what tech teams can learn from that level of trust. - The role of preparation, structured feedback, and the importance of stepping away when stuck. - How performing teaches the same resilience needed when shipping software. - just as no two performances of the same piece are identical, no two developers solve a problem in the exact same way.
Keynote Speaker
Sarah Peters
Read More
Room 2 - AI Track
→ 30 mins

Guardrails for AI in Cybersecurity Testing—Balancing Power with Safety

Artificial Intelligence (AI) and Large Language Models (LLMs) are transforming cybersecurity testing by accelerating vulnerability discovery, generating adversarial payloads, and automating penetration testing workflows. However, the same capabilities that empower defenders can also introduce significant risks—such as enabling automated exploitation, hallucinated vulnerabilities, and bias-driven false alarms. This talk examines how to responsibly integrate AI into cybersecurity testing pipelines without compromising trust, compliance, or ethical boundaries.
Keynote Speaker
Savi Grover
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Breaking the Boredom Barrier: Making Cybersecurity Campaigns Fun, Bold, and Unforgettable

Let’s be honest, most cybersecurity campaigns feel like a chore. They’re complex, jargon-heavy, and built as if every employee speaks fluent “security.” Spoiler alert: they don’t! When people don’t understand, they don’t engage. In this talk, I will discuss the hidden roadblocks that make traditional campaigns fall flat and why assuming everyone shares our language is the biggest mistake. Then, I’ll show you how to flip the script: create campaigns that are simple, surprising, and just crazy enough to work. You’ll leave with practical examples and creative ideas to turn cybersecurity from a chore into something people actually want to be part of because security doesn’t have to be boring. It can be bold, fun, and unforgettable.
Keynote Speaker
Clint Spicer
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Let's Do Bad Things to Unsecured Containers

There is plenty of advice about what to do when building and deploying containers to make sure we are secure. But why do we need to do them? How important are some of these “best” practices? Can someone take over my entire system because I missed one step? What is the worst that could happen, really? Join Gene as he guides you through exploiting unsecured containers. We’ll abuse some commonly missed security recommendations to demonstrate the impact of not properly securing containers. We’ll exploit these lapses and discover how to detect them. Nothing reinforces good practices more than seeing what not to do and why. If you’ve ever wondered why those container recommendations are essential, this is where you can find out.
Keynote Speaker
Gene Gotimer
Read More
Room 2 - AI Track
→ 30 mins

Optimizing Identity for Agentic AI: A CxO's Blueprint

The rise of AI promises transformative automation but creates a new security mandate: managing intelligent agent identities at scale. This session offers CxOs and decision-makers a strategic set of metics and controls for building robust identity programs tailored for AI. NHI security is the foundational backbone of effective agentic AI identity and access management. As AI agents gain autonomy, their identities become the primary control plane for trust and governance. I'llshow how common identity challenges, like credential sprawl and privilege escalation, manifest uniquely with NHIs, demanding new detection and lifecycle management paradigms. The core focus is on managing identity by behavior, posture, and usage at a massive scale. We'll explain why traditional governance models are insufficient for the dynamic, high-volume interactions of AI agents.
Keynote Speaker
Michael Silva
Read More
Room 7 - Workforce/Education Track
→ 30 mins

The Time I Accidentally Ended Up Combatting Fraud for a Year

This is the story of the most intense year of my 20 year professional career. I was the sole developer hired by a company going through a circus-like ownership transition while criminals actively worked to defraud the 300,000 users of this 14 year old, high end marketplace. We experienced late nights, numerous technical challenges, worked with abuse response teams, learned a lot of lessons about phishing and fraud, high emotions, death threats and at least one person lost a business that depended on the site. Here’s the story from start to finish, including how to prevent many of these problems on your own site. Buckle up.
Keynote Speaker
Barry Jones
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Cybersecurity is Ready for Local Models

Cybersecurity has long relied on global models such as threat intel feeds, vulnerability rankings, and behavior baselines built on aggregated telemetry across organizations. While useful, these models show their limits in today’s cloud-native, supply chain–driven, high-variance environments. Systems like CVSS and even EPSS cannot always capture the specific risks or protections of an individual enterprise. The next frontier is local models—statistical and causal models grounded in an organization’s unique assets, configurations, behaviors, and exposures. This talk presents a practical framework for building and operationalizing such models in production. Drawing on advances in telemetry-based modeling and on-premise LLMs, we will show how teams can move from generic scoring to dynamic, environment-specific assessments with measurable gains in precision and reduced mean time to decision.
Keynote Speaker
Michael Roytman
Read More
Room 2 - AI Track
→ 30 mins

Resilient Healthcare Supply Chains: Harnessing AI/ML to Reinvent PPE Manufacturing

The COVID-19 pandemic revealed the fragility of global healthcare supply chains, with hospitals struggling to secure critical protective equipment. Beyond shortages, many organizations lacked the predictive tools needed to anticipate demand surges or adapt production at scale. This presentation explores how artificial intelligence (AI) and machine learning (ML), integrated with Manufacturing Execution Systems (MES) and Industrial Internet of Things (IIoT) platforms, are reshaping healthcare manufacturing. From AI-enabled quality inspection and predictive maintenance to digital worker assistance and agile production planning, these technologies have turned supply chain challenges into opportunities for innovation.
Keynote Speaker
Natarajan Ravikumar
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Auditing Critical Infrastructure: Keeping the Lights On

This presentation delves into NERC CIP standards, detailing their history, governance, and structure to enhance cybersecurity for the Bulk Electric System (BES). Attendees will explore how these standards align with risk-based audits, addressing asset identification, secure access controls, and incident response. Key insights include the standards' modular framework, governance by FERC and regional entities, and their evolution to safeguard North America’s power grid. The session highlights risk-based monitoring to ensure compliance and effective threat mitigation, offering actionable guidance for professionals navigating NERC CIP in a dynamic regulatory environment.
Keynote Speaker
Jermaine Green
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Future-Readying Your PKI for 2025 and Beyond

As organizations grapple with growing complexity in managing Public Key Infrastructure (PKI)—from manual certificate lifecycles to compliance risks—the future demands even more agility. This session explores today’s PKI pain points, the looming challenges of quantum computing and cryptographic agility, and how automation tools built for the post-quantum era can transform your security posture. Learn how to streamline operations, reduce risk, and prepare your PKI for what’s next.
Keynote Speaker
Roni Bliss
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Passwordless Authentication: Balancing Security, Usability, and Enterprise Readiness

Passwordless authentication is transforming enterprise security by eliminating vulnerable passwords, which contribute to 80% of breaches and 75% of phishing incidents. Beyond security, password resets cost $70–$100 each and drain up to 520,000 hours annually in mid-sized organizations. This session explores modern approaches biometrics, FIDO2 hardware tokens, mobile push approvals, and magic links that deliver both stronger defenses and streamlined user experiences. Adoption trends show a 127% rise in hardware token use, 83% adoption of fingerprint authentication, and a 79% drop in account takeovers, with ROI gains of 271% over three years. Yet challenges remain: hardware costs of $45–$70 per user, privacy concerns among 41% of employees, and integration gaps in 29% of enterprise apps. Attendees will learn practical strategies for phased rollout, IAM integration, and user adoption to balance security, usability, and readiness for a password-free future
Keynote Speaker
Naga Yeswanth Reddy
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Agentic AI for Trusted, Scalable Intelligence

As security threats and data complexity grow, traditional search can’t keep up. This session explores Agentic AI Systems multi-agent architectures that transform search into trusted, decision-ready intelligence. By orchestrating Researcher, Analyst, Domain Expert, and Quality Checker agents, these systems deliver context-aware, bias-resistant insights. Learn how agentic AI strengthens investigations, supports real-time analysis, and provides secure, scalable intelligence for InfoSec leaders and practitioners.
Keynote Speaker
Ajitha Rathinam Buvanachandran
Read More
Room 2 - AI Track
→ 45 mins

Morning Keynote: MG M. Todd Hunt

Join us for this exciting presentation from the Adjutant General of the North Carolina National Guard.
Keynote Speaker
Todd Hunt
Read More
Room 2 - AI Track
→ 30 mins

AI Copilots in Cloud Security: Performance, Risks & Production Readiness

As enterprises embed LLMs into secure cloud data workflows, cybersecurity evaluation is essential. This research studied AI copilots across four security-sensitive domains: pipeline scaffolding, SQL optimization, IAM policy generation, and compliance rule encoding. Findings show 25% productivity gains, 35% performance boosts for mid-level engineers, 45% fewer syntax errors, but only 8% fewer logical errors. Security-mature teams cut deployment time 15%, while less mature ones faced 10% delays. Domain insights: scaffolding supported simple ETL but faltered with complex patterns; SQL copilots flagged injection risks; IAM generation often defaulted to overpermissive roles; compliance encoding suffered from hallucinated rules. A key discovery—AI-induced security errors—demands dedicated testing. Teams with automated security testing detected far more vulnerabilities. Guidance: scale AI securely while ensuring auditability, access control, and compliance.
Keynote Speaker
Sunny Kesireddy
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Think Like a Hacker, Train Like a Pro

Bridging the gap between cybersecurity theory and real-world practice is one of the biggest challenges facing organizations today. Many professionals learn frameworks, tools, and processes, but struggle to apply them effectively in high-pressure situations. To develop a truly capable workforce, we need to teach people to think like attackers while still acting ethically and responsibly. This session introduces a practical, intermediate-level approach to cyber education that focuses on adversarial thinking, critical reasoning, and scenario-based learning. Participants will explore hands-on techniques for fostering intuition about attacker behavior, spotting potential vulnerabilities before they’re exploited, and embedding these exercises into regular team development programs. By the end of the session, attendees will have actionable methods to cultivate cyber talent capable of anticipating threats, making smarter decisions under pressure, and proactively reducing organizational risk.
Keynote Speaker
Shivani Sharma
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

The Deliberate Disruptor: Why Elite Organizations Institutionalize Skepticism in 2025

In today’s high-stakes business environment, consensus and alignment often mask blind spots, missed opportunities, and costly mistakes. What if your organization’s edge lies in systematically challenging its own assumptions? Join Jim Benvie, “The History PM,” as he reveals why elite organizations are institutionalizing skepticism as a strategic advantage. Drawing from historical case studies and business examples, Jim demonstrates how structured challenge improves decision quality, exposes risks, and prevents groupthink. The Deliberate Disruptor methodology isn’t about conflict—it’s about disciplined critical thinking that stress-tests key decisions, builds psychological safety, and strengthens resilience. In an era of digital transformation and constant disruption, the ability to question assumptions may be your most important safeguard against failure.
Keynote Speaker
Jim Benvie
Read More
Room 2 - AI Track
→ 30 mins

SAINT AI vulnerability research and product demonstration

In this demonstration, SAINT Product Strategist, Randall Laudermilk and SAINT CTO, Sam Kline, will discuss SAINT's current research on the state of AI/ML/LLM vulnerabilities, and demonstrate how AI vulnerabilities are researched and supported within SAINT's vulnerability management solutions. This discussion and product demonstration will be of interest to audiences responsible for risk management and compliance programs, as well as technology professionals interested in the behind the scenes of AI vulnerability and exploitation research.
Keynote Speaker
Sam Kline
Keynote Speaker
Randall Laudermilk
Read More
Room 7 - Workforce/Education Track
→ 30 mins

(Perfect) Cell Games: You Thought It Was Just Surveillance... But This Is My True Power!!

Rogue cell towers are usually framed as surveillance tools, but the story does not end with privacy. The cellular arena is wrapped in mysticism that discourages deeper inquiry, yet flaws in 3GPP cell selection reveal a broader danger. Fake base stations can deny or disrupt the connections that critical infrastructure depends on, from power telemetry to traffic coordination and connected vehicles. This talk reframes rogue cells as a cyber-physical threat, showing how design choices rooted in trust and permissiveness open the door to cascading real-world risks that extend well beyond surveillance.
Keynote Speaker
Mike Curnow
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Building a Better Security Awareness Program

Most security awareness programs are built to check a box—not change behavior. I’ve spent my career both on the offensive side of security and in the classroom, and I’ve seen firsthand what actually works (and what doesn’t) when it comes to building a culture of security. In this presentation, I share real-world stories and lessons from the field, highlighting practical strategies grounded in how people learn and how attackers think. I’ll explore why so many programs fail to move the needle—and how to fix them. Whether you’re a program manager responsible for getting awareness initiatives off the ground or shaping organizational risk from the executive level, you’ll leave with ideas you can put to work immediately. Session attendees can earn ISC2 CPE credit!
Keynote Speaker
Ken Smith
Read More
Room 2 - AI Track
→ 30 mins

RAGe Against the Machine: AI-Powered Compliance and Cybersecurity

As organizations grapple with increasingly complex regulatory environments and evolving cyber threats, the integration of AI has become a game-changer. This session will explore how Retrieval-Augmented Generation (RAG) can revolutionize compliance, regulation gap analysis, and cybersecurity operations. Attendees will gain insights into real-world use cases, technical implementations, and lessons learned from deploying AI-driven compliance solutions at scale. We'll showcase practical demonstrations, discuss best practices, and provide actionable strategies for leveraging AI to stay ahead of compliance challenges. Whether you're a developer, security professional, or compliance officer, this session will equip you with the knowledge and tools to harness AI for regulatory excellence and cyber resilience.
Keynote Speaker
Brennan Lodge
Read More
Room 7 - Workforce/Education Track
→ 30 mins

Advanced Techniques for Securing Modern Applications

In the dynamic landscape of cybersecurity, staying ahead of emerging threats is mission critical when it comes to protecting your organizations digital assets and maintaining customer trust. This speaker will cover the trends in technology and cybersecurity providing a forward-looking perspective on application security. This session will delve into advanced strategies and methodologies for securing modern applications, a focus on the integration of AI and some of the latest trends. Attendees will gain valuable insights into how AI and Machine Learning will combine with threat modeling, risk assessment and threat research with an emphasis on identifying and mitigating vulnerabilities in the Secure Software Lifecycle while learning how implementing Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Mobile Application Security Testing (MAST), and Software Composition Analysis (SCA) tools as part of organizational security posture.
Keynote Speaker
Eric Hart
Read More
Room 8A Cyber & Innovation Track
→ 30 mins

Secure, Scalable Healthcare Analytics: SAS, Machine Learning, and Emerging Tech

Healthcare is being reshaped as advanced analytics move to the core of clinical decision-making and operational resilience. This session shows how SAS-based frameworks and modern machine learning enable secure, scalable analysis of clinical, imaging, and administrative data with high accuracy. By unifying structured and unstructured data, organizations can improve diagnostic precision, predict risks, and streamline treatment planning while ensuring compliance and trust. We will explore strategies that integrate real-time pipelines, distributed storage, and advanced processing frameworks with strong governance, encryption, and anonymization to protect patient privacy and meet HIPAA/GDPR standards. Attendees will also gain a forward view of innovations—quantum computing for genomics, automated ML for clinician-driven models, edge computing for real-time monitoring, and federated learning with explainable AI—that are driving collaboration, trust, and sustainable healthcare innovation.
Keynote Speaker
Srinivasa Susrutha Kumar Nayudu Ambati
Read More
Room 2 - AI Track
→ 1 hour

Luncheon Keynote with Georgeo Pulikkathara

Georgeo Pulikkathara is the Chief Information Officer (CIO) and Chief Information Security Officer (CISO) at iMerit Technology, a global AI data solutions company. George has over 34 years of experience in information technology and information security leadership within the banking, healthcare, technology, and defense industries. George has direct incident response experience with ransomware and nation-state cyber-attacks. Previously, George was the CISO for Dovenmuehle Mortgage and DataStax, a DBaaS cloud startup. George is a versatile CISO with security leadership experience at prominent organizations, including Microsoft, Hewlett-Packard Enterprise, BMO, RBC Capital Markets, AIG, Avanade, Dovenmuehle, and the US Army. George has proudly served 25 years in the US Army Reserve, starting from the rank of Private (E-1) and working his way up to Colonel (O-6), Cyber Operations Officer in the US Army Reserve, with an active DoD Top Secret security clearance. George has been deployed twice, leading Soldiers into combat zones within Eastern Afghanistan and Mosul, Iraq. George was awarded the Bronze Star Medal twice for his actions in a combat zone. George currently serves in the US Army Reserve as a Colonel, cyber operations officer, protecting national critical infrastructure. George is pursuing his doctoral studies in Cybersecurity, earning a Doctor of Philosophy (PhD) at National University, with an anticipated graduation date of August 2028. George is a doctoral student at National University, currently listed on the Dean’s list, and in the Honor Society. George holds an MBA from the University of North Carolina - Chapel Hill and a BBA in Banking and Finance from the University of Houston. His security certifications include CISSP, CISM, CISA, CDPSE, Azure Fundamentals, ITIL, PMP, and ISO 27001 Lead Implementer.
Keynote Speaker
Georgeo Pulikkathara
Read More
Room 2 - AI Track
→ 3 hours

Amazon's Culture of Innovation and Working Backwards Overview

Join us for an immersive 3-hour workshop where you'll first learn about Amazon's Culture of Innovation and later apply Amazon's Working Backwards methodology to address pressing cybersecurity challenges. This hands-on session will empower you to innovate within the realm of security, balancing rapid advancement with robust protection. Led by experienced Amazon facilitators, you'll: - Gain insights into Amazon's culture of innovation - Learn the Working Backwards process, a powerful tool for customer-centric problem-solving - Apply this method to your own organization's security challenges Whether you're looking to enhance your security posture, create new security products, or solve complex cybersecurity issues, this workshop will provide you with a fresh perspective and practical tools to drive innovation in your organization.
Keynote Speaker
Nick Miller
Keynote Speaker
Gabriela DeFilippi
Keynote Speaker
Isaac Owusu-Hemeng
Read More
Room 7 - Workforce/Education Track
→ 3 hours

Live Cyber Crisis Simulation – Watch Leadership Under Fire

High-impact, gamified cybersecurity simulation designed to expose the real-world complexity of incident response—beyond playbooks and technical checklists. Led by cybersecurity veteran Mark Wiener, the simulation places five participants from the audience in the hot seat as the executive team of a fictional company facing a major incident. While they manage unfolding events in real time, the audience gains a rare fly-on-the-wall perspective into the decision-making dynamics, missteps, and strategic pivots that happen under pressure. Participants must rapidly navigate legal, reputational, operational, and communication challenges as they evolve with no script, and no safety net. - Engaging: A live, unscripted scenario with real-time reactions and tough choices. - Educational: Demonstrates the organizational, not just technical, nature of incident response. - Impactful: Importance of cross-functional alignment, executive muscle memory, and communication under duress.
Keynote Speaker
Mark Wiener
Read More
Room 8A Cyber & Innovation Track
→ 3 hours

Inside the Attack: A MITRE ATT&CK–Driven Approach to Modern Incident Response

SpartanTec will be leading a workshop at the upcoming Secure Carolinas Conference 2025 focused on Incident Response. In this session, we’ll share our expertise on what to look for in a potential breach and show how our threat analysts review and resolve attacks using the MITRE ATT&CK framework. Drawing on real-world scenarios, we’ll demonstrate how a structured approach to incident response helps organizations detect, respond, and mitigate threats more effectively while strengthening resilience and reducing risk.
Keynote Speaker
Lisa Carter
Read More

Event Sponsors

Sponsor the 2025 Secure Carolinas Conference to elevate your brand’s visibility among key cybersecurity professionals and decision-makers, and to showcase your commitment to enhancing regional security efforts.

Why Sponsor?

Sponsoring the 2025 Secure Carolinas Conference in Raleigh positions your brand as a leader in cybersecurity. Gain direct access to industry decision-makers, showcase your solutions, and build lasting relationships with key stakeholders. Elevate your visibility and demonstrate your commitment to advancing cybersecurity across the Carolinas and beyond.
  • 0+

    Social Media Followers

    Boost visibility through thousands of yearly views on our platform.
  • 0+

    Pageviews/Yr

    Boost visibility through thousands of yearly views on our platform.
  • 0+

    Avg Attendance

    Connect with hundreds of cybersecurity, AI, and data science professionals.
  • 0+

    Newsletter Subscribers

    Reach decision-makers directly through our growing, targeted email newsletter list.

Company Footprint

Our attendees represent organizations of all sizes—from nimble startups to Fortune 500 giants. Over 70% come from companies with 1,000+ employees, giving your brand access to enterprises with real buying power and influence.

Who you'll reach

Reach key decision-makers and industry experts who are shaping the future of cybersecurity, data privacy, and AI. These are the leaders setting strategies, managing budgets, and driving innovation across finance, healthcare, government, technology, and more.

Conference Partners

Partner with the 2025 Secure Carolinas Conference to demonstrate your dedication to advancing regional cybersecurity. By aligning with us, you showcase your commitment to strengthening security efforts across South Carolina, while gaining visibility and forging valuable connections within the cybersecurity community.

  • Become a Partner today

    Partner with one of the top cyber security events company in South and North Carolina today.

Keynote Speakers

We are proud to present a powerhouse lineup of speakers for the 2025 Secure Carolinas Conference, each recognized as a leader in the cybersecurity space. This group includes senior government officials, top industry executives, leading researchers, and frontline practitioners who are shaping the future of security.

Together, they bring a wide range of perspectives—from policymaking and operational defense to academic research and emerging technologies. Attendees will gain firsthand access to the latest developments, tested strategies, and actionable insights drawn from real-world experience.

Through keynote sessions and focused discussions, these experts will explore today’s most urgent cybersecurity challenges and share forward-thinking solutions that can be applied across industries. Whether you’re protecting critical infrastructure, managing enterprise risk, or driving innovation, the knowledge shared here will be directly relevant to your work.

Don’t miss this opportunity to learn from those driving the conversation in cybersecurity. The 2025 Secure Carolinas Conference is your chance to hear from the best, expand your perspective, and walk away with strategies you can use right away.

Adam Rak
Ajitha Rathinam Buvanachandran
Barry Hudson
Barry Jones
Brennan Lodge
Brooks Raiford
Clint Spicer
Dan Lohrmann
Eric Hart
Gabriela DeFilippi
Gene Gotimer
Georgeo Pulikkathara
Isaac Owusu-Hemeng
Jennifer Ray
Jermaine Green
Jim Benvie
Ken Smith
Laura Baker
Lisa Carter
Lisa Carter
Mark Wiener
Markel Samuel
Michael Roytman
Michael Silva
Mike Curnow
Naga Yeswanth Reddy
Natarajan Ravikumar
Nick Miller
Nick Miller
Nishanth Sirikonda
Randall Laudermilk
Ric Halsaver
Rob Main
Roni Bliss
Sahvante Leach
Sam Kline
Sarah Peters
Savi Grover
Shivani Sharma
Srinivasa Susrutha Kumar Nayudu Ambati
Sunny Kesireddy
Todd Hunt
Tom Scott
Yolanda Reid

Hotel Information

  • 18 location 3
    2539 S Saunders St, Raleigh, NC 27603
  • Have the dependable value and service you expect when you stay with us at Quality Inn® in Raleigh, North Carolina. Minutes from the North Carolina Capitol building, our Raleigh location grants travelers the ease of getting around the city while still having great value. Our comfortable guest rooms are located just off Interstate 40, which connects you to North Carolina’s mountains and the coast. Utilize our meeting space, which is perfect for business travelers, especially those making connections at the Raleigh Convention Center. Enjoy any of the multiple restaurants that surround our hotel or head into Downtown Raleigh and choose from the city’s diverse food scene. See the beautiful campus of North Carolina State University or wander the exhibits of the North Carolina Museum of Natural Sciences. You’ll find unbeatable value and comfortable amenities when you check in with us.

    Book Your Room
    2
    Event Date
    8:00 am - 5:00 pm