Presenting Sponsor:

2024 Palmetto Cyber Summit

The CyberSC Board of Governors invites you to the 2024 Palmetto Cyber Summit on February 21-22, 2024

The 2024 Summit provides a critical venue in which current professionals can share the skills, knowledge, and expertise necessary to keeping South Carolinian’s safe from cyber threats in all their various forms.

The event, in its 2nd year, will bring together experts to provide timely content and address a variety of cybersecurity issues impacting local government. Attendees will hear from government and industry leaders on the latest developments and gain insights into managing today’s cybersecurity challenges.
The 2024 Summit provides a critical venue in which current professionals can share the skills, knowledge, and expertise necessary to keeping South Carolinian’s safe from cyber threats in all their various forms.

The agenda for the conference will showcase recognized speakers and experts to lead sessions on topics such as:

  • Government and private sector collaboration
  • Cybersecurity and workforce development
  • Cybersecurity infrastructure
  • Private sector cybersecurity trends

Up to 13 CPE/CLEUs Available

Cutting edge solutions

Meet with some of the world's most respected and high ranked vendors showcasing some of the latest cybersecurity technology solutions and services.

Technology trends

Learn from national cybersecurity researchers on what trends and issues to be looking for in these highly informative and forward leaning discussions.

Industry experts

Industry experts on Cyber Terrorism, Ransomware, and Incident Response provide their insight and share their knowledge.

Cooperative Conference Center

 

The Cooperative Conference Center at 169 Laurelhurst Avenue in Columbia, SC

is the venue selected to host this year’s summit.

Event Schedule

Check the program below for this year's summit agenda and learn about the speakers and sessions in store for cyber enthusiasts of all kinds.
Site: Main Lobby

Registered Attendees can pick up their name badge and get any summit materials.

Work Better

LIMITED ATTENDANCE - REGISTRATION FOR PRE-SUMMIT WORKSHOPS OPENS ON FEB 1, 2024.

Join our three-hour workshop designed for IT security industry leaders. In this engaging workshop, you'll explore essential aspects of leadership, decision-making, and achieving a balanced work-life dynamic within our fast-paced digital age. Through interactive discussions and personalized assessments, we'll provide you with practical tools to assess and improve your leadership skills. You'll gain insights into your emotional intelligence and learn valuable time management techniques that you can apply immediately to enhance your day-to-day effectiveness. Through the first part of this workshop, you'll gain valuable insights and a new language for self-awareness.

In the second part, we'll shift our focus to applying these concepts in real-life situations. You'll have the opportunity to put your learning into practice, honing your leadership skills and refining your ability to make better and faster decisions. Additionally, we'll explore how to strike a healthy balance between your professional and personal life, ensuring that you can excel both in your role as a cybersecurity leader and in your everyday life.

3 CPE Credits per attendee``

Rubrik

LIMITED ATTENDANCE - REGISTRATION FOR PRE-SUMMIT WORKSHOPS OPENS ON FEB 1, 2024.

All of the ransomware experience. None of the risk.

Ever witnessed a ransomware attack firsthand? Get all of the experience with none of the risk in this fully immersive experience.

It’s the middle of the night. Your phone rings. Your heart sinks as the person on the other end reads you the ransom note. All your data is encrypted—even your backups—and they want $1 million.

Luckily, it’s all part of the live, role-playing experience …

Join Rubrik in partnership with Microsoft for an in-person event to see what happens behind the scenes during a ransomware attack and run through what you might do if faced with a similar situation.

3 CPE Credits per attendee

Armis

LIMITED ATTENDANCE - REGISTRATION FOR PRE-SUMMIT WORKSHOPS OPENS ON FEB 1, 2024.

Do you know what devices are connected to your network, managed or unmanaged? How do you know if they are secure? With Armis, you can get real-time visibility and control over every agency asset connected to your network.

The Overview of the Platform Will Focus On:
-Discovering and managing an accurate, unified, and continuous asset inventory across all connected devices (IT, OT/ICS, BMS/HVAC, IOT, Healthcare, and more)
-Satisfying compliance: Zero Trust Architecture, Continuous Diagnostics and Mitigation, CIS Benchmarks, BOD 23-01
-Finding specific device(s) or activities with no instructions given

This hands-on session includes:

High-level overview of Armis
Hands-on experience in the Armis platform demonstrating the ease of use, simplicity, and business value for your organization

3 CPE Credits per attendee

Michael Melore

Join Emcee Michael Melore as we kick off the 2nd annual Palmetto Cybersecurity Summit.

IBM Public Sector Security Ambassador, Sr Cyber Security Advisor, Certified Information Systems Security Professional, Author, frequent National public speaker and moderator, FBI InfraGard committeeman, and recognized subject matter expert in Security and Threat Intelligence, Identity Access Governance, and Authorization.

Pioneer in Identity and Access Management, Access Governance, and Authentication. Past Consulting roles include: Lead architect for many of the world’s largest authentication and authorization infrastructures. This includes two of the 1st individual Billion user authentication infrastructures. Founder/Moderator for 19 Nationwide (1400+ Security Executive Members) CISO/Security Leader Round Table Chapters across the US (aka SecRT). Champion, host and evangelist of regularly scheduled cyber range threat simulation exercises, cyber training and education.

Mathieu Gorge

Mathieu is the CEO and Founder of VigiTrust, providing Integrated Risk Management (IRM) SaaS solutions to clients in 120 countries across various industries. Mathieu helps CEOs, CXOs, and Boards of directors handle cyber accountability challenges through good cyber hygiene and proactive cybersecurity compliance programs. Mathieu believes in constantly updating his methodology, the 5 Pillars of Security Framework™, to ensure it addresses the latest security and compliance regulations and newest security threats. He is a Featured Forbesbooks author, innovator, and in-demand speaker.

2:00 PM - 2:15 PM

Site: Exhibit Hall

Refreshment Break and Opportunity to Visit Vendors

Jonah Wisch

The workforce gap in cybersecurity requires industry, academia, non-profits, community organizations, and non-traditional training pathway programs to work together in order to boost the number of skilled cyber professionals in the United States. Simultaneously, local governments are suffering from lack of cyber resources all across the country. Jonah Wisch will discuss unique workforce development efforts in Colorado that provide aspiring cybersecurity analysts with hands-on, operational experiences in a commercial environment by monitoring live data from local governments.

Jonah Wisch is the former Program Director at the National Cybersecurity Center in Colorado Springs, CO. where he oversaw the Cyber Resource Center, Cyber for Government Leaders, Cyber for Small Business, Cyber for Executives programs as well as Project PISCES. His programs provide cybersecurity training, education, products and services and create workforce development opportunities for aspiring cybersecurity professionals. Additionally, he holds an MBA with a focus in Cybersecurity Management from UCCS and a graduate certificate in National Security Intelligence. Between the date of writing this bio and presenting at the Palmetto Cyber Summit, his wife will have given birth to their son, Daniel James Wisch.

Mike Ward

Dive into the digital realm where mythical beasts lurk, not in the shadows but in the bytes and networks of our small businesses. ``Digital Dragons`` is a lively, engaging presentation designed for the non-super-tech savvy, unveiling the top three cyber threats that small businesses face today. Picture these threats as dragons - Phishing, Ransomware, and Insider Threats - each with its unique danger and each requiring a clever strategy to defeat.

Mike Ward - A Multifaceted Leader Blending Technology, Leadership, and Community Engagement Mike Ward is a distinguished professional in cybersecurity, particularly within the small business sector. As the CEO and Co-Founder of Turtle Creek Concepts, LLC, since 2018, Mike has been instrumental in developing robust cybersecurity strategies that protect businesses in today's digital landscape.

Timothy De Block

Threat modeling is a critical process that helps organizations identify and mitigate potential security threats in the early stages of projects or when a legacy application is discovered with little to no documentation. This presentation aims to serve as a comprehensive introduction to the wonderful galaxy of Threat Modeling.

``Timothy De Block is a seasoned cybersecurity expert with over 15 years of experience in the field. His passion for technology and security led him to a successful career dedicated to safeguarding digital assets and promoting best practices in cybersecurity. His dedication to continuous learning and staying at the forefront of emerging threats has allowed him to become a trusted authority in the industry. Throughout his career, Timothy has held key roles in both public and private sectors, working with leading organizations to strengthen their security posture. He has been instrumental in developing and implementing robust security strategies, threat mitigation plans, and incident response protocols for a diverse range of clients. As a thought leader in the cybersecurity community, Timothy is a sought-after speaker at conferences and seminars, where he shares his insights and practical knowledge on topics such as threat modeling, application security, and other blue team based topics. He is also a published author, contributing articles and research papers to industry publications. Timothy De Block's expertise, dedication, and contributions to the cybersecurity field continue to make a significant impact, ensuring a safer digital environment for all. Whether in boardrooms, classrooms, or the global cybersecurity community, his influence is felt, and his commitment to cybersecurity excellence is unwavering. ``

2:45 PM = 3:00 PM

Site: Exhibit Hall

Refreshment Break and Opportunity to Visit Vendors

Kurtis Suhs

The digital and physical world are colliding. This session will address how cyber threats, sentiment and physical security impact organizations and how open source intelligence (OSINT) can proactively alert the target and help minimize these threats.

Mr. Suhs serves as the Founder and C.E.O. for Concierge Cyber®, an Atlanta based company. Modeled after roadside assistance, Concierge Cyber with Entity Shield and Concierge Cyber with Executive Shield powered by Nisos is a subscription service that proactively provides its members with managed threat intelligence and critical threat alerts that address cyber, sentiment and physical security. Members also have access to an emergency response team of highly respected third-party service providers, on a pay-as-you-go basis, at pre- negotiated and substantially discounted rates. Kurt has over 38 years of experience in the insurance and financial services sectors and helped launch the first cyber insurance product in 1997. Prior to founding Cyber Special Ops, Kurt served as SVP and Global Cyber Chief Underwriting Officer for 9 years at Ironshore Insurance, a Liberty Mutual Insurance Company, where he was responsible for innovating cyber insurance products and risk management solutions across all lines of coverage on a global basis. Earlier in his career Kurt was an Investigator with the FDIC where he investigated financial institution fraud and professional liability claims for failed banks. He also represented the FDIC in the New England Bank Fraud Working Group, assisted the FBI in criminal investigations, and performed FIRREA forfeitures and seizures. He taught courses on financial institution fraud, directors' and officers' liability insurance, criminal restitution recovery and civil asset forfeitures at the FDIC;s national training facility in Washington D.C.

Earl Gregorich

Setting up Small Business Basic Fraud & Cyber Protection for Under $500

Small businesses are increasingly becoming targets for fraud and cyber attacks. In today's digital age, protecting sensitive information and financial transactions is more important than ever. The costs of a security breach can be significant, from loss of customers' trust to financial loss.

In this presentation, attendees will learn how to protect their businesses from these threats while minimizing costs and utilizing the free or low-cost solutions that exist. It will provide practical, actionable insights and tips for small business owners to protect their operations.

``Earl joined the South Carolina Small Business Development Center Network (SBDC) as an experienced business counselor from Dayton, Ohio with over 15 years of experience in entrepreneurship consulting. He holds a B.S. degree in Organizational Leadership and currently runs his own internet based company. He has been an entrepreneur for over 20 years in sales, business services and ecommerce. Earl is a U.S. Air Force veteran and was stationed at Shaw Air Force Base in Sumter, SC in the late ‘80s. His most recent position before moving to South Carolina in August, 2015 was SBDC Regional Director at Wright State University. Earl's center was responsible for all military veteran Boots to Business training within the state of Ohio and several technology oriented programs. Entrepreneurial training, website design, online sales and marketing as well as general business technology are some of Earl's specialties. He has been asked to conduct courses and speak in local, regional and national programs and truly enjoys conducting classes for small business owners. In his past career experience, Earl has held certification as an Internet Webmaster, served as an IT Director of a small industrial distributor and created and facilitated ecommerce training programs used by the South Carolina and Ohio SBDC network. Earl has been awarded the Small Business Administration’s SBDC Excellence and Innovation Award, the SBA Veteran Small Business Champion of the Year, the Ohio SBDC Peer Recognition Award for Mentorship, the Ohio SBDC State Star Award, and the South Carolina SBDC Statewide Leadership Award. During his off time, Earl can be found in the woodshop, the kitchen or in the outdoors mountain biking, canoeing, or camping. He and his wife Carol reside in Greenville, South Carolina and regularly visit their grown children and grandchildren in the Upstate. ``

William Kintz

Introduction to Control System security, importance of securing OT for the protection of staff and productivity, and the key differences between IT and OT security.

Vice President of Engineering and Training at Sun Management, Inc & Founder of Coastal Carolina Cyber Guild, President of Charleston ISC2 Chapter, Senior Reserve Intelligence Officer - USCG (CAPT/O6). ICS Security SME for SANS Institute, Member of SANS GIAC Advisory Council. GRID, GICSP, ISA/IEC 62443, GCFA, GLEG, CISSP certified.

Col. Linda Riedel

Learn about the 228th Signal Brigade and its work protecting the US across the Palmetto State and the World.

Colonel Riedel is the Brigade Commander of the 228th Theater Tactical Signal Brigade, South Carolina Army National Guard (SCARNG) located in Spartanburg, SC where she leads and directs the training and general operations of the 151st Signal Battalion and 125th Cyber Battalion. COL Riedel recently deployed as the US Army Central (ARCENT) Deputy Chief of Staff, G6 (Forward) in support of Operation Spartan Shield and Inherent Resolve. COL Riedel works full-time at The Citadel as the Deputy Director of Operations and Outreach, Citadel DoD Cyber Institute (CDCI).

Dr. Deirdre Appleby

In a world increasingly dependent on digital technologies, the demand for a skilled and resilient cybersecurity workforce is greater than ever. This session explores the pivotal role that business and industry can play in supporting K-12 education to develop the cybersecurity workforce of the future.

Join in this collaborative exploration of how businesses and industries can actively contribute to shaping the next generation of cybersecurity professionals. Together, let's pave the way for a secure and resilient digital future.

``Deirdre (Dee) Appleby, Ed.S, Ph.D. - SC Chapter WiCyS Vice President Cybersecurity visionary and educational leader, passionate about shaping the future of tech education. Director of MedTech7 at Beaufort County School District, dedicated to inspiring the next generation of digital innovators. #EdTechLeader #CybersecurityExpert #WiCyS``

Michael Holcomb

Cyber attacks against industrial (ICS/OT) networks are increasing.

And the rate is accelerating.

``Michael Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. His current role provides him with the opportunity to work in securing some of the world’s largest ICS/OT environments, from power plants and commuter rail to manufacturing facilities and refineries. He is currently completing his Master’s thesis on the attack surface of Programmable Logic Controllers (PLCs) with the SANS Technology Institute. Additionally, he maintains cyber security and ICS/OT certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more. As part of his community efforts, Michael founded and leads the UpstateSC ISSA Chapter and BSides Greenville conference. He also wrote and taught all six cyber security courses for Greenville Technical College's cyber security program which focused on helping educate the cyber security practitioners of tomorrow. In 2023, he was awarded CyberSC's MG Lester D. Eisner Award for Cyber Excellence in Leadership for the State of South Carolina.``

Tony Marshall

In my presentation, I will make the case that the only way to ensure you have a competent cybersecurity workforce will be to proactively develop it.

Degrees are important but competence is required. Competence is gained faster and more efficiently if education, training, and experience are provided in a coordinated fashion. In a multi-year pilot, we have proven that apprenticeship is the best way to develop the cyber workforce that Federal, State and Commercial organizations need. During my presentation, I will explain the proper steps to cyber talent development.

I will outline a process that has been proven and in use now to develop Cyber talent in a fast, efficient, scalable, dependable manner. Proper screening at the beginning, combined with foundational education, virtual simulation training, actual work experience, while being mentored and coached. This combined in proper measure, produces highly productive professionals. Work-based learning combined with a rigorous, competency-based academic program has been proven to produce motivated highly-skilled professionals.

Tony is a STEM entrepreneur with over 25 years of experience resolving complex technology-based challenges. His vision is to provide cybersecurity services while building the next generation cyber workforce. In a talent-scarce environment, Tony and team developed a federally registered cybersecurity apprenticeship program that has proven to be a very successful and scalable talent development model. He and his team authored a revolutionary cybersecurity apprenticeship model that effectively integrates education, training, certification, and work-based learning. His driving passion is to advance ISGCyber as the premier provider of cybersecurity services while building cybersecurity careers. Within that vision is a need to address the needs of Veterans, Veteran spouses, and underrepresented populations. Tony was recognized by, SynED, a national non-profit organization that identifies emerging best practices for effective articulation between employers, job seekers, and education providers, as its national CyberHero. Tony has a long history of community service including: his local church, Wake County Public Schools, Triangle YMCA, The National Minority Supplier Development Council, Data Quality Campaign, Wake County Workforce Board and others.

Sean McCloskey

Join CISA's Sean McCloskey talking about cyber hygiene.

Kenneth Alexander

In the rapidly evolving landscape of cybersecurity, Palo Alto Networks stands at the forefront, recognizing the transformative impact of automation and artificial intelligence (AI) on threat actors. The traditional approach of relying on ``point products`` has become insufficient in coping with the sheer speed and volume of modern cyber threats. As adversaries increasingly harness the power of automation and AI, organizations must reevaluate their security strategies.

Kenneth is a Red Hat Cybersecurity Architect concentrating on Department of Defense projects. He has a passion for Cybersecurity and anything open source. He has worked many initiatives globally for Red Hat and currently pursuing his Doctorate in Systems Engineering from CSU.

He enjoys focusing on Zero Trust Architecture, Edge and the Hybrid Cloud. Currently he is also working two community projects Kestrel-as-a-Service for Team Threat Hunting and Crowsnest-security for Zero Trust Visualization.

Rep. Sylleste Davis

Join us in a conversation with SC House of Representatives Sylleste Davis to talk about the new AI/Cybersecurity committee.

Sylleste H. Davis, born on October 12, 1961, is an American politician1. She is a member of the South Carolina House of Representatives from the 100th District, serving since 20161. She is a member of the Republican party1. Davis is Chair of the House Medical, Military, Public and Municipal Affairs Committee1.

She was born in Charlotte, North Carolina, and is the daughter of Charles and Sylvia Helms2. She graduated from the College of Charleston with a B.S. in Mathematics in 1983 and from Webster University with an M.A. in 19872. Before her political career, she was a retired Electric Utility Manager and IT Professional2.

Site: Exhibit Hall/Concourse

Join us for a cocktail reception hosted by Deloitte

Site: Main Lobby

Registered Attendees can pick up their name badge and get any summit materials.

Kyle Bryans

The Multi-State Information Sharing and Analysis Center (MS-ISAC) a division of the Center for Internet Security is happy to offer a new Email Security Program at no-cost to all State Local Tribal and Territorial Government Entities. In this session, you will learn how to leverage this added layer of defense as well as the rest of the MS-ISAC offerings.

Kyle Bryans is a Regional Engagement Manager for the Multi-State Information Sharing and Analysis Center™ (MS-ISAC®), a division of CIS® (Center for Internet Security, Inc.®). He is a member of the Stakeholder Engagement team, which works with our nation’s State, Local, Territorial, and Tribal (SLTT) governments, providing no-cost cybersecurity resources and services to enhance their collective posture. Kyle manages the accounts MS-ISAC members throughout the Southern U.S.

Jeff Janies

Artificial Intelligence and Machine Learning (AI/ML) intends to improve the efficiency and effectiveness of every day cyber operations, but it also provides a rich tool set for adversaries to identify and exploit vulnerabilities in everything from personal devices to critical national infrastructure. In this session we will discuss how AI already exists in your cyber operations and our lessons learned in bringing AI/ML to bear in cyber across a variety of industries and the principal risks and limitations that should be considered in the planning, adoption, governance, and maturing of AI/ML for cyber operations.

Jeff Janies is a Specialist Leader in Deloittes Government and Public Services practice. He leads teams in the development and delivery of data science approaches that support cyber operations. He has over 18 years of experience in developing and delivering mission-driven analytics-based approaches to support cyber operations in everything from data enrichment, transformation, and loading to behavioral modeling of network traffic for detection of malicious activity. He holds a B.S. in Computer Science from Louisiana State University and an M.S. in Computer Science from the University of South Carolina.

Kenneth Peeples

Threat hunting can be slow and tedious due to the manual steps required. Kestrel is an open source project that provides a language for humans to express what to hunt and a machine interpreter that deals with how to hunt. Although Kestrel improves the time to detect, there are limitations to team capabilities in threat hunting tools and standards. The power of team threat hunting may be able to remove the limitations, therefore, decreasing the MTTD (Mean Time to Detect), achieved by combining Kestrel with JupyterHub hunts with Kestrel huntbooks in order to be persistent and shared by team members.

``Kenneth is a Red Hat Cybersecurity Architect concentrating on Department of Defense projects. He has a passion for Cybersecurity and anything open source. He has worked many initiatives globally for Red Hat and currently pursuing his Doctorate in Systems Engineering from CSU. He enjoys focusing on Zero Trust Architecture, Edge and the Hybrid Cloud. Currently he is also working two community projects Kestrel-as-a-Service for Team Threat Hunting and Crowsnest-security for Zero Trust Visualization.``

Brandon Stephens

Consumers of IT security products and services are constantly bombarded with marketing jargon, new and confusing acronyms, and sometimes questionable sales tactics. This presentation is designed to help those consumers wade through all the noise from the marketplace in the hopes they can walk away with the clarity needed to create tangible, measurable, and realistic risk management strategies.

Brandon is passionate about helping people in the IT and Information Security fields and currently serves as a Senior Solution's Architect with HighPoint. He has a diverse background having worked in various security roles across Healthcare, Higher Education, Manufacturing, and Managed Services.

Chip Reaves

The human brain is a finely tuned, highly efficient forgetting machine. Most of the information we receive is not retained - and that's a good thing. But how does that affect our efforts to train end-users to avoid phishing and social engineering attacks? A scientific paper from 1885 may hold the answer.

Bigger Brains Founder and President Chip Reaves is a serial entrepreneur who has started five successful IT companies. An Atlanta native, Chip began fixing computers for local businesses while studying Computer Science at Georgia Tech. After 10 years building a successful IT Services firm in Atlanta, he co-founded Computer Troubleshooters which went on to become the world’s largest IT service franchise with over 450 locations in 30 countries, receiving multiple awards from Entrepreneur Magazine, Franchise Business Review, and AllBusiness.com. In 2012 Chip started Bigger Brains, an off-the-shelf eLearning platform for MSPs, designed to deliver unique, high quality online training in technology and business productivity topics.

Lisa Carter

What can you do to protect your business from being held hostage, lost profits and irreparable reputation damage? This includes dangerous beliefs that are putting your organization at risk and the costs of a cyberattack that go beyond paying ransomware. It's a disturbing fact but cybercriminals are emboldened by A.I.

Lisa Carter is the founder of SpartanTec, Inc, a top technology provider of IT Services across North Carolina and South Carolina. In Cyber Security for more than 20 years, Lisa is quick to point out that for everything that touches an organization’s network, “Security is Key”. In fact, Lisa has always known that she wanted to work in IT security. Armed with a Bachelor in Marketing, and experience selling managed firewalls, she recognized a need in the marketplace and SpartanTec was born. With more than 20 years under her belt, she now proudly leads a dynamic engineering department and sales team and ensures all SpartanTec clients are handled with the highest quality and professionalism. A Myrtle Beach, South Carolina resident, Lisa enjoys reading and hanging out with her husband Chris and their 2 daughters.

9:30 AM - 10:00 AM

Site: Exhibit Hall

Refreshment Break and Opportunity to Visit Vendors

Michael Melore

Join Emcee Michael Melore as we kick off Day 2 of the 2nd Annual Palmetto Cybersecurity Summit for Local Government

William MacMillan

William MacMillan is the Chief Product Officer at an early-stage cybersecurity incubation led by Red Cell Partners. Prior to this position, he was Senior Vice President for Information Security at Salesforce. Prior to his retirement from the federal government, William served as the Chief Information Security Officer (CISO) at the Central Intelligence Agency (CIA), where he led a sweeping transformation of CIA’s cybersecurity strategy and organization.

Prior to serving as CISO, William held multiple senior leadership positions at CIA dealing with various aspects of intelligence, counterintelligence, and cyber operations. During his career, he focused significant attention on insider threat, supply chain risk, and incident response issues, as well as the development of CIA’s Cybersecurity Operations Center (CSOC). William also held several key leadership positions in CIA’s Center for Cyber Intelligence (CCI), which is responsible for intelligence collection, analysis, and operations focused on foreign cyber threats to US interests.

Earlier in his career, he served in multiple overseas tours as an Operations Officer, employing specialized training and foreign language skills to conduct intelligence operations in support of US national security. He held several key leadership positions during this time, including Chief of Base in a war zone. Prior to joining CIA, William served as an officer and a pilot in the United States Air Force’s Combat Rescue and Special Operations communities, where he developed and employed cultural expertise focused on the Middle East and Central Asia.

William graduated from the United States Air Force Academy with a BS in Biology. He also holds an MA in International Relations from Salve Regina University and an MS in cybersecurity from George Mason University. William, his wife, and their three children reside in the Pacific Northwest.

11:00 AM -11:15 AM

Site: Exhibit Hall

Refreshment Break and Opportunity to Visit Vendors

Mike Bimonte

Join our expert panel as they dissect the ``whole-of-state`` approach to cybersecurity, a collaborative model weaving together all levels of government for a stronger digital shield. Dive deep into the nuts and bolts: building shared threat intelligence, forging resilient infrastructure, and empowering local guardians. Hear firsthand stories of successful implementations and tackle the challenges head-on. From policy insights to practical tools, this panel will leave you ready to champion a safer, more secure future for your state.

Moderator: William Oden
Panelists: MIke Bimonte, Armis & Heath Beach

Mike Bimonte brings a diverse perspective to Armis as the CTO for SLED, with over 30 years of IT experience in both Public and Private sector roles. Most recently Mike came to Armis from his role as Deputy Commissioner with the NYC Dept. of Information Technology and Telecommunications (DoITT). He spent close to 20 years modernizing, consolidating and transforming DoITT into a world class service provider for both City agencies and the 8+ million residents of NYC. His ability to relate with public sector clientele based on real life experiences and provide his own unique perspective has proven invaluable to State, Local governments across the globe. Prior to his role with the City of NY, Mike spent time in the Financial Services industry and with the Federal Bureau of Investigation. Mike is a native New Yorker, born and raised in NYC and now resides in NJ with his family.

Heath Beach is the co-founder and CEO of Avail Strategies, a highly respected governmental consulting firm based in Tallahassee, Florida. Before becoming a consultant, Heath most recently served as the State of Florida Deputy State Chief Information Officer/Acting State Chief Information Officer, overseeing the state data center, the state's private network, Public Safety Communications, telephone services, and more. From the beginning of his 20+ year career, he had a passion for making government better by identifying and executing on solutions, technology, and outsourcing to the private the sector. Heath continues to work with the Florida Legislature and key state agency leadership on various policies to make technology stronger for State, Local, and Education.

Dr. Sybil Rosado

Social engineering has been recognized as a potent tool for human manipulation. Now with the rapid advancement of artificial intelligence (AI), malicious actors have a powerful ally in their quest to exploit human vulnerabilities.

This presentation aims to explore the dangerous synergy between malicious social engineering techniques and AI technology. We will delve into various aspects of this lethal combination, including the emerging threats posed by AI-powered social engineering attacks, the potential impact on individuals and society, and the strategies to mitigate these risks.

We will begin with an overview of social engineering and provide examples of how AI has revolutionized social engineering.
We will discuss the potential consequences of successful AI-driven social engineering attacks and we will explore the ethical implications of using AI for malicious purposes and the challenges to regulating this technology.
Finally, we will discuss countermeasures and strategies to defend against AI-powered social engineering attacks.

Dr. Sybil Rosado, Esq., is a professional who effortlessly combines her expertise as a lawyer, cybersecurity expert, consultant, and public speaker. With an impressive array of qualifications and a passion for empowering others, she has established herself as a leading figure in the fields of cultural diversity training, cyber security, and beyond. As a practicing attorney and tenured full Professor at Benedict College, Dr. Rosado brings a wealth of legal knowledge and experience to her work. Her extensive education, including a Juris Doctorate from Vanderbilt University Law School, equips her with a deep understanding of the intricacies of the legal system. With a focus on Legal Anthropology and digital culture she explores the intersections of law, culture, and society, offering unique insights into the complexities of our modern world. Dr. Rosado's expertise extends beyond the realm of law, and social science as she is also an expert in cybersecurity policy and law. She combines her M.S. in Cyber Security with law and culture, to delve into the intricacies of digital culture, including artificial intelligence, digital fraud, and social engineering. Dr. Rosado is also a respected anthropologist, further enriching her understanding of societal dynamics and cultural complexities. Her research interests encompass a wide range of topics, including diversity training, cyber security education, and the social implications of technology. Dr. Rosado is a native of Tampa, Florida where she graduated from Chamberlain High school. She earned a B.S. in Political Science with a concentration in Human Resource Management and Labor Relations from Florida A & M University, and a M.A. and Ph.D. in Cultural Anthropology with concentrations in Sociology and Women's Studies from the University of Florida. She is the wife of Tony Kennedy and the proud mother of Sybil and Angel Rosado.

Robby Hill

At the cybersecurity summit, an IT consultant and a representative from a cybersecurity firm co-present an educational session. They focus on a real-life scenario where they collaborated to devise and implement an incident response plan for a mutual client who was targeted by a cyber attack. The session begins with a brief introduction of the speakers and their expertise. They then outline the initial discovery of the attack, emphasizing the critical signs that indicated a breach.

Robby Hill is an entrepreneur, philanthropist, and Founder & CEO of information technology consulting firm HillSouth. Robby founded HillSouth at the age of 17, while still a student at West Florence High School. Robby has served in public office and on the board of numerous non-profit organizations across South Carolina. He is a graduate of Leadership South Carolina and Leadership Florence as well as the recipient of awards from the SBA, Florence Chamber, and SC Works. Formed in 2001, HillSouth is a privately-held IT consulting firm based in Florence, South Carolina, and services clients all over the country with a particular emphasis on the unique computing and security needs of the healthcare industry. Robby is a director at First Reliance Bank; member of the Pee Dee Regional Airport Authority and holds an FAA private pilot certificate with an instrument rating.

Jeramy is a security evangelist and is currently responsible for the technical strategy in Tennessee, Alabama, Mississippi, and North and South Carolina leveraging next-generation security solutions in Network, Endpoint, Mobile, Email, and Cloud services. Jeramy works with the public relations team at Sophos to answer questions, conduct interviews, and provide expertise to security topics, trends, and insights. In addition, Jeramy creates XDR content on the Sophos community page and videos on the digital support site. Prior to Sophos, Jeramy spent time as a Senior Engineer in the Greater Pittsburgh Metro architecting solutions and managing the technical direction of their largest financial clients.

Paul Brownridge

Join CyberSC Executive Director Tom Scott in the presentation of the annual Awards of Cyber Excellence for Industry, Academia, Government, and Leadership followed by a LIVE HACK by PenTestPartners

1:15 PM - 1:30 PM

Site: Exhibit Hall

Refreshment Break and Opportunity to Visit Vendors

Tony Dillon

This cybersecurity conference panel delves into the transformative power of competitions in shaping the cybersecurity workforce of tomorrow. Featuring esteemed panelists from diverse backgrounds, including the Palmetto Cyber Defense Competition, M'Aiken Magic FIRST Robotics competition, the Ft. Eisenhower Alliance’s Cyber Patriot competition, and Benedict College’s HacktheHack competition, this session explores how these platforms foster skills, innovation, and collaboration. Learn how participants gain hands-on experience, hone critical problem-solving abilities, and develop skills to meet the workforce demands of tomorrow. Discover the unique perspectives and strategies these competitions offer for cultivating a dynamic and capable cybersecurity workforce. Join us to unlock the potential of competitive learning in preparing cybersecurity professionals for the challenges ahead.

Moderator: Mr. Tony Dillon, USC
Panelists: Karen Cooke, NIWIC; Dr. Leon Geter, Benedict College; Ambrose Wiering, SRNL

Dr. Donnie Wendt

Disinformation in the Age of Generative AI

Recently, we have seen tremendous advancements in generative AI, such as deepfakes and ChatGPT. There are many positive uses for generative AI technologies. However, they can also be powerful tools for social engineering and spreading misinformation. This presentation will provide an overview of generative AI technology and discuss some recent examples where such technology has been used to commit fraud or spread misinformation. Of course, this technology is accelerating rapidly, so we will also look at what the future may hold. Finally, we will discuss what organizations must do to prepare for and respond to these coming threats.

Dr. Donnie Wendt is a Principal Security Researcher for Mastercard. He researches the latest security threats, technologies, products, services, and innovations to drive the company’s long-range security roadmap. Much of his recent research has focused on machine learning, exploring its immense capabilities within cybersecurity and the threats it presents. In addition to his professional experience, Donnie is an adjunct professor of cybersecurity at Utica University. He earned his doctorate in Computer Science from Colorado Technical University, where his research focused on security automation and adaptive cyber defense. He also holds an MS in Cybersecurity from Utica University.

John Vecchi

With billions of smart devices in use today, there are 10 times more xIoT devices worldwide than all traditional endpoints combined. Most of these devices including IoT, OT, IoMT, and IIoT Cyber-Physical Systems are unknown, unmanaged, and unmonitored, posing significant security risks.

As Chief Marketing Officer at Phosphorus Cybersecurity, John's achieved more than 25 years of experience in high-tech security marketing, strategy, product marketing, product management, and consulting. A serial CMO and security visionary, he has helped build and lead some of the biggest brands in enterprise security, including Solera Networks, Blue Coat Systems, Check Point Software, McAfee, Zscaler, Anitian, ColorTokens, and Anonyome Labs. Throughout his career, John's been featured at events and conferences worldwide, built an award-winning security podcast titled ``Security on Cloud,`` and wrote as a featured columnist at SECURITYWEEK, writing about advanced threats and big data security.

Carl Bjerke

Introduction to the concept of saving customers around expense, time, and providing efficiencies, by automating complex compliance related adherence requirements - regardless of what Framework (NIST, CIS, HIPPA, etc.) or through whatever industry the customer/end user is involved.

Carl is the CEO, and Chief Evangelist of Compliancy. A company born out of a rising need - especially in the small and medium sized business space - to create cost savings and efficiencies, by automating processes and work-flows, where it is compulsory for businesses to report upon, collect, store or manage required data points - that might be required by State/Local and Federal governments, regulatory agencies, or internal corporate governance. Carl, a proud Wildcat graduate from the University of New Hampshire, he has held a number of successful Executive, and field level positions - as an active seller, and solution creator - across all sectors - in the data management/protection, business continuity areas. Carl specializes in working with Managed Service Providers, and Value Added Resellers. Based in Mid-Central North Carolina - Carl's passions includes, reading, world politics, home construction projects, hacking at the golf ball, and with his wife - giving aid and shelter to a multitude of pets of various types.

Tim is in charge of sales, having recently joined Compliancy. A company born out of a rising need - especially in the small and medium sized business space - to create cost savings and efficiencies, by automating processes and work-flows, where it is compulsory for businesses to report upon, collect, store and manage required data points - required by State/Local and Federal governments, regulatory agencies, or internal corporate governance.
Tim graduated from the College of William and Mary. He has held a number of successful Executive, and field level positions - as an active seller, and solution creator - across all sectors - in the data management/protection, business continuity areas. Tim has made a career out of working with end users, Managed Service Providers, and Value Added Resellers across all sectors providing inexpensive solutions to complex IT problems. Based in metro Charlotte North Carolina - Tim's passions includes, reading, wine and spirits appreciation, hacking at the golf ball, and with his wife - working with the poor and less fortunate in the extended metro area through their church.

Tom Scott

A vCISO service offering provides organizations with access to experienced cybersecurity professionals who offer strategic leadership, risk management, program development, incident response support, and compliance guidance. This flexible and scalable model enables organizations to benefit from expert cybersecurity guidance without the need for a full-time in-house CISO, enhancing their overall cybersecurity posture and resilience.

Thomas Scott (Tom) is the CEO and Founder of CyberSherpas, a virtual CISO and cybersecurity consulting company. As the inaugural Director of the SC Cyber Consortium, he has been a key leader in the cyber education, cyber workforce development, and cyber protection efforts in both South Carolina and across the Nation. He currently serves as the founding director of the non-profit South Carolina Cyber Foundation and Association.

Mark Brophy

Ransomware threat actors have moved into the data center space and have begun to attack hypervisors. Learn what is going on and how to best protect yourself since most standard security tools can't protect you.

Mark Brophy started in the IT field in 2000. Worked with VMWare since 1.0 Managed many ESXi clusters of all sizes for different employers Was one of the first VMWare SRM customers in South Carolina B.S. Degree in Information Security & M.S. Degree in Information Technology Systems Management CISM, CISSP, GCIH, GDSA, GSNA & MBR certifications Currently Incident Responder & DFIR Team Lead for SecurIT360 Adjunct Faculty, Cyber Security for ECPI University (have previously taught at NJIT, NC State & few others) Frequent speaker and contributor to technology and security events.

2:45 PM - 3:00 PM

Site: Exhibit Hall

Refreshment Break and Opportunity to Visit Vendors

Jason Oakes

This presentation will review the essential strategies for companies to proactively prepare for the changes in PCI DSS 4.0. It will provide a brief overview of the evolving landscape of payment card industry standards, and will focus on the new requirements that potentially increase the compliance burden to comply with PCI. The presenter will provide details such as new control requirements and revised compliance timelines, providing insights for organizations from the point of view of an Internal Security Assessor (ISA). Moreover, the presentation will emphasize the changes in PCI 4.0 are in-line with previous versions of PCI DSS. These new requirements previously were either recommended or implied, and the new standard formalizes these into new requirements. The goal of PCI DSS 4.0 is still the same, to foster a culture of business as usual security practices to achieve compliance. Participants will gain actionable insights into areas that need review to ensure a smoother transition to PCI DSS 4.0.

Jason Oakes serves as the Business Information Security Officer at Lowe's Companies. His professional background includes over a decade of enterprise information security within the retail industry. This includes system, process and control design expertise for systems handling financial and payment data. Jason holds professional certifications from leading cyber security professional organizations, including ISC2, ISACA, and the Payment Card Industry Security Standards Council (PCI).

Jim Hayes

The anatomy of a cyber attack typically involves reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. In combating these steps, Artificial Intelligence (AI) is revolutionizing cybersecurity. AI's predictive capabilities enhance threat detection by analyzing patterns and behaviors, identifying anomalies that signify potential threats. This proactive approach is critical in a landscape where threats evolve rapidly.

Jim is an experienced technical officer with 27+ years of IT (Information Technology) experience. Jim has used his experience and expertise to serve and support the IT and Data Center community, serving as the President of the AFCOM Central Ohio Chapter.
Currently Jim is the Field CTO for DartPoints where he is responsible for supporting sales executives, proving portfolio value to prospects and customers, and relationship management of key contacts. As a trusted subject matter expert in solution-based technologies, Jim provides guidance of product definition and works to develop innovative technology strategies within the office of the CTO.

Justin Scarpaci

The anatomy of a cyber attack typically involves reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. In combating these steps, Artificial Intelligence (AI) is revolutionizing cybersecurity. AI's predictive capabilities enhance threat detection by analyzing patterns and behaviors, identifying anomalies that signify potential threats. This proactive approach is critical in a landscape where threats evolve rapidly.

Justin Scarpaci helps Managed Service and Managed Security Service Provider partners build services around the Sevco Asset Intelligence platform. He acts as the primary technical resource for all partners and works closely with the Sevco product team.Prior to Sevco, Justin held a variety of roles in the intelligence community, military and in cybersecurity operations including technical roles at VMware Carbon Black, the United States Marine Corps, and as a contractor for the US Air Force where he defended networks in the CENTCOM area of operations.

Featured Speakers

Our speakers come from all over the US. You’ll hear from renowned industry experts and visionary leaders.

William MacMillan

Former CISO Central Intelligence Agency

William MacMillan is the Chief Product Officer at an early-stage cybersecurity incubation led by Red Cell Partners.

Prior to this position, he was Senior Vice President for Information Security at Salesforce. Prior to his retirement from the federal government, William served as the Chief Information Security Officer (CISO) at the Central Intelligence Agency (CIA), where he led a sweeping transformation of CIA’s cybersecurity strategy and organization. Prior to serving as CISO, William held multiple senior leadership positions at CIA dealing with various aspects of intelligence, counterintelligence, and cyber operations.

Rep. Sylleste Davis

Representative - South Carolina House of Representatives

Sylleste H. Davis, born on October 12, 1961, is an American politician1. She is a member of the South Carolina House of Representatives from the 100th District, serving since 20161. She is a member of the Republican party1. Davis is Chair of the House Medical, Military, Public and Municipal Affairs Committee1.

She was born in Charlotte, North Carolina, and is the daughter of Charles and Sylvia Helms2. She graduated from the College of Charleston with a B.S. in Mathematics in 1983 and from Webster University with an M.A. in 19872. Before her political career, she was a retired Electric Utility Manager and IT Professional2.

Mathieu Gorge

CEO/Founder of Vigitrust

Mathieu is the CEO and Founder of VigiTrust, providing Integrated Risk Management (IRM) SaaS solutions to clients in 120 countries across various industries.

Mathieu helps CEOs, CXOs, and Boards of directors handle cyber accountability challenges through good cyber hygiene and proactive cybersecurity compliance programs.

Mathieu believes in constantly updating his methodology, the 5 Pillars of Security Framework™, to ensure it addresses the latest security and compliance regulations and newest security threats. He is a Featured Forbesbooks author, innovator, and in-demand speaker.

Tom Scott

CyberSC Executive Director

Thomas Scott (Tom) is the CEO/Founder of CyberSherpas, a vCISO company. As the inaugural Director of the South Carolina Cyber Consortium, he has been a key leader in the cyber education, cyber workforce development, and cyber efforts in both South Carolina and across the Nation. He currently serves as the founding director of the non-profit South Carolina Cyber Foundation and Association, known as CyberSC. With over 30 years of State Government experience in both Florida and South Carolina,

Tom has developed a wealth of knowledge and experience in protecting State critical infrastructure and cyber assets. He currently holds certifications in information security, information auditing, security leadership, critical infrastructure, and project management – he is also recognized a FEMA Continuity of Operations Planning (COOP) Practitioner.

Dr. Sybil Rosado

Rosado Law Firm

Dr. Sybil Rosado, Esq., is a professional who effortlessly combines her expertise as a lawyer, cybersecurity expert, consultant, and public speaker. With an impressive array of qualifications and a passion for empowering others, she has established herself as a leading figure in the fields of cultural diversity training, cyber security, and beyond. As a practicing attorney and tenured full Professor at Benedict College,

Dr. Rosado brings a wealth of legal knowledge and experience to her work. Her extensive education, including a Juris Doctorate from Vanderbilt University Law School, equips her with a deep understanding of the intricacies of the legal system. With a focus on Legal Anthropology and digital culture she explores the intersections of law, culture, and society, offering unique insights into the complexities of our modern world.

Michael Melore

IBM Public Sector Security Ambassador

IBM Public Sector Security Ambassador, Sr Cyber Security Advisor, Certified Information Systems Security Professional, Author, frequent National public speaker and moderator, FBI InfraGard committeeman, and recognized subject matter expert in Security and Threat Intelligence, Identity Access Governance, and Authorization. Pioneer in Identity and Access Management, Access Governance, and Authentication.

Past Consulting roles include: Lead architect for many of the world’s largest authentication and authorization infrastructures. This includes two of the 1st individual Billion user authentication infrastructures. Founder/Moderator for 19 Nationwide (1400+ Security Executive Members) CISO/Security Leader Round Table Chapters across the US (aka SecRT). Champion, host and evangelist of regularly scheduled cyber range threat simulation exercises, cyber training and education.

Speakers

Our speakers bring decades of expertise to share with Summit attendees.

Mike Bimonte

SLED Chief Technology Officer

Mike Bimonte brings a diverse perspective to Armis as the CTO for SLED, with over 30 years of IT experience in both Public and Private sector roles. Most recently Mike came to Armis from his role as Deputy Commissioner with the NYC Dept. of Information Technology and Telecommunications (DoITT). He spent close to 20 years modernizing, consolidating and transforming DoITT into a world class service provider for both City agencies and the 8+ million residents of NYC. His ability to relate with public sector clientele based on real life experiences and provide his own unique perspective has proven invaluable to State, Local governments across the globe. Prior to his role with the City of NY, Mike spent time in the Financial Services industry and with the Federal Bureau of Investigation. Mike is a native New Yorker, born and raised in NYC and now resides in NJ with his family.

Kyle Bryans

MSISAC Specialist

Kyle Bryans is a Regional Engagement Manager for the Multi-State Information Sharing and Analysis Center™ (MS-ISAC®), a division of CIS® (Center for Internet Security, Inc.®).

He is a member of the Stakeholder Engagement team, which works with our nation’s State, Local, Territorial, and Tribal (SLTT) governments, providing no-cost cybersecurity resources and services to enhance their collective posture.

Kyle manages the accounts MS-ISAC members throughout the Southern U.S.

William Oden

USAF (Ret)

Mr. Oden was born in Indianapolis, Indiana. He enlisted in the U.S. Air Force in November 1974. He served 23 years and retired as the Senior Network Administrator responsible for four Fighter Squadrons and associated units’ computer and network systems to include secure networks for the 20th Operations Group, Shaw Air Force Base, South Carolina.
He retired from the Air Force in December 1997. While serving in the Air Force, he received multiple awards, ribbons and medals to include, Graduate United States Air Force Senior Noncommissioned Officer Academy, Distinguished Graduate and member of the Honor Flight for Tactical Air Command Noncommissioned Officer Academy, Honor Graduate Noncommissioned Officer Leadership School, the Air Force Achievement Medal with one oak leaf cluster, the Air Force Commendation Medal with one oak leaf cluster, and the Air Force Meritorious Service Medal.

Lisa Carter

CEO

Lisa founded SpartanTec, Inc. in 2002 for one reason: to help the CEOs of businesses to eliminate the problems, costs and headaches of IT in their company. As CEO, I am responsible for the overall direction of the company as well as day-to-day decisions to achieve our goals. My responsibilities include but are not limited to overall delivery of customer service, quality technical support, developing new service offerings, selecting best of breed technologies and company marketing and events.

Ben Byxbe

Founder/Principal Consultant

Ben is the founder of Work Better, a management consulting firm based out of Columbia, SC. He is obsessed with helping people be more profitable and even more productive in their work. He maintains certifications in Giant Worldwide as a Guide, helping leaders navigate the digital age with their people, and as a Working Genius Facilitator with The Table Group, helping people find joy and fulfillment in their work. He and his wife Allison have three kids, two dogs, and a small flock of backyard chickens.

Jeramy Kopacko

Sr Territory Solutions Engineer

Jeramy Kopacko is currently responsible for supporting Sophos Security Operations across the East Coast. He leads a blog for Security Operation (SecOps) Best Practices for Sophos User Community for investigating digital forensics with EDR and XDR. With 10+ years of industry experience, he worked as a Network and System Architect and formerly a K-12 Technology Director. He completed his Master of Science at the Volgenau School of Engineering at George Mason University in Applied Information Technology, focused on Cybersecurity Engineering in 2023. He is now studying for a series of offensive security related certifications. Based in North Carolina, Jeramy is a member of NC-PACE and attends the regions ISSA, BSides, and cybersecurity events frequently.

Robby Hill

Founder, CEO

Robby Hill is an entrepreneur, philanthropist, and Founder & CEO of information technology consulting firm HillSouth. Robby founded HillSouth at the age of 17, while still a student at West Florence High School. Robby has served in public office and on the board of numerous non-profit organizations across South Carolina. He is a graduate of Leadership South Carolina and Leadership Florence as well as the recipient of awards from the SBA, Florence Chamber, and SC Works. Formed in 2001, HillSouth is a privately-held IT consulting firm based in Florence, South Carolina, and services clients all over the country with a particular emphasis on the unique computing and security needs of the healthcare industry. Robby presently serves as a director at First Reliance Bank and holds a private pilots certificate

Earl Gregorich

SC SBDC Greenville Area Manager

Earl joined the South Carolina Small Business Development Center Network (SBDC) as an experienced business counselor from Dayton, Ohio with over 15 years of experience in entrepreneurship consulting. He holds a B.S. degree in Organizational Leadership and currently runs his own internet based company. He has been an entrepreneur for over 20 years in sales, business services and ecommerce. Earl is a U.S. Air Force veteran and was stationed at Shaw Air Force Base in Sumter, SC in the late 80s.

His most recent position before moving to South Carolina in August, 2015 was SBDC Regional Director at Wright State University. Earl's center was responsible for all military veteran Boots to Business training within the state of Ohio and several technology oriented programs.

Dr. Deirdre Appleby

Dr. Deirdre (Dee) Appleby - SC WiCyS Chapter Vice President Director MSAP/MedTech7 - Beaufort County School District

Deirdre (Dee) Appleby, Ed.S, Ph.D. - SC Chapter WiCyS Vice President

Cybersecurity visionary and educational leader, passionate about shaping the future of tech education. Director of MedTech7 at Beaufort County School District, dedicated to inspiring the next generation of digital innovators. #EdTechLeader #CybersecurityExpert #WiCyS

Timothy De Block

Head of Security Exploration and Innovation

Timothy De Block is a seasoned cybersecurity expert with over 15 years of experience in the field. His passion for technology and security led him to a successful career dedicated to safeguarding digital assets and promoting best practices in cybersecurity. His dedication to continuous learning and staying at the forefront of emerging threats has allowed him to become a trusted authority in the industry.

Throughout his career, Timothy has held key roles in both public and private sectors, working with leading organizations to strengthen their security posture. He has been instrumental in developing and implementing robust security strategies, threat mitigation plans, and incident response protocols for a diverse range of clients.

As a thought leader in the cybersecurity community, Timothy is a sought-after speaker at conferences and seminars, where he shares his insights and practical knowledge on topics such as threat modeling, application security, and other blue team based topics. He is also a published author, contributing articles and research papers to industry publications.

Timothy De Block's expertise, dedication, and contributions to the cybersecurity field continue to make a significant impact, ensuring a safer digital environment for all. Whether in boardrooms, classrooms, or the global cybersecurity community, his influence is felt, and his commitment to cybersecurity excellence is unwavering.

Kurtis Suhs

Chief Executive Officer

Mr. Suhs serves as the Founder and C.E.O. for Concierge Cyber®, an Atlanta based company. Modeled after roadside assistance, Concierge Cyber with Entity Shield and Concierge Cyber with Executive Shield powered by Nisos is a subscription service that proactively provides its members with managed threat intelligence and critical threat alerts that address cyber, sentiment and physical security. Members also have access to an emergency response team of highly respected third-party service providers, on a pay-as-you-go basis, at pre- negotiated and substantially discounted rates. Kurt has over 38 years of experience in the insurance and financial services sectors and helped launch the first cyber insurance product in 1997.

Prior to founding Cyber Special Ops, Kurt served as SVP and Global Cyber Chief Underwriting Officer for 9 years at Ironshore Insurance, a Liberty Mutual Insurance Company, where he was responsible for innovating cyber insurance products and risk management solutions across all lines of coverage on a global basis. Earlier in his career Kurt was an Investigator with the FDIC where he investigated financial institution fraud and professional liability claims for failed banks. He also represented the FDIC in the New England Bank Fraud Working Group, assisted the FBI in criminal investigations, and performed FIRREA forfeitures and seizures. He taught courses on financial institution fraud, directors and officers liability insurance, criminal restitution recovery and civil asset forfeitures at the FDICs national training facility in Washington D.C.

Carl Bjerke

Chief Executive Officer

Carl is the CEO, and Chief Evangelist of Compliancy. A company born out of a rising need - especially in the small and medium sized business space - to create cost savings and efficiencies, by automating processes and work-flows, where it is compulsory for businesses to report upon, collect, store or manage required data points - that might be required by State/Local and Federal governments, regulatory agencies, or internal corporate governance.

Carl, a proud Wildcat graduate from the University of New Hampshire, he has held a number of successful Executive, and field level positions - as an active seller, and solution creator - across all sectors - in the data management/protection, business continuity areas. Carl specializes in working with Managed Service Providers, and Value Added Resellers.

Based in Mid-Central North Carolina - Carl's passions includes, reading, world politics, home construction projects, hacking at the golf ball, and with his wife - giving aid and shelter to a multitude of pets of various types.

Jonah Wisch

Program Director at National Cybersecurity Center

Jonah Wisch is the former Program Director at the National Cybersecurity Center in Colorado Springs, CO. where he oversaw the Cyber Resource Center, Cyber for Government Leaders, Cyber for Small Business, Cyber for Executives programs as well as Project PISCES. His programs provide cybersecurity training, education, products and services and create workforce development opportunities for aspiring cybersecurity professionals. Additionally, he holds an MBA with a focus in Cybersecurity Management from UCCS and a graduate certificate in National Security Intelligence. Between the date of writing this bio and presenting at the Palmetto Cyber Summit, his wife will have given birth to their son, Daniel James Wisch.

Mike Ward

CEO Turtle Creek Concepts

Mike Ward is a distinguished professional in cybersecurity, particularly within the small business sector. As the CEO and Co-Founder of Turtle Creek Concepts, LLC, since 2018, Mike has been instrumental in developing robust cybersecurity strategies that protect businesses in today's digital landscape.

Mike's proficiency in cybersecurity is underpinned by a comprehensive understanding of network security, information technology, and strategic planning. This expertise is evident in his successful leadership at Turtle Creek Concepts, where he ensures the highest standards of digital security and integrity. Turtle Creek Concepts, LLC recently earned a spot on the NextGen 101 list published in 2023.

Colonel Linda Riedel

228th Signal Brigade Commander/Deputy Director, Citadel DoD Cyber Institute (CDCI)

Colonel Riedel is the Brigade Commander of the 228th Theater Tactical Signal Brigade, South Carolina Army National Guard (SCARNG) located in Spartanburg, SC where she leads and directs the training and general operations of the 151st Signal Battalion and 125th Cyber Battalion. COL Riedel recently deployed as the US Army Central (ARCENT) Deputy Chief of Staff, G6 (Forward) in support of Operation Spartan Shield and Inherent Resolve. COL Riedel works full-time at The Citadel as the Deputy Director of Operations and Outreach, Citadel DoD Cyber Institute (CDCI).

CSM Tim Larkin

228th Theater Tactical Signal Brigade Command Sergeant Major

CSM Tim Larkin was born in New Orleans, LA. He enlisted in the South Carolina Army National Guard in March of 1997. He attended Basic Combat Training (BCT) at Ft Jackson, SC and Advanced Individual Training (AIT) at Ft Gordon, GA. Upon completion of training, he was awarded the Military Occupational Specialty (MOS) of 25L, Cable System Installer Maintainer. Throughout his career, he also earned the MOSs of 25U, Signal Support Systems Specialist; 25B, Information Technology Specialist; 25D, Cyber Network Defender, and 17C, Cyber Operations Specialist.

Jason Oakes

Business Information Security Officer at Lowe's Companies

Jason Oakes serves as the Business Information Security Officer at Lowe's Companies. His professional background includes over a decade of enterprise information security within the retail industry. This includes system, process and control design expertise for systems handling financial and payment data. Jason holds professional certifications from leading cyber security professional organizations, including ISC2, ISACA, and the Payment Card Industry Security Standards Council (PCI).

Tony Dillon

Director of Internship Programs and Clinical Instructor

Tony Dillon is a proven leader and manager of education administration and curriculum development. Specializes in leadership, program management, curriculum, staff development, aligned with state and federal regulations. Possesses background in problem solving and proven leadership skills derived from educational, technical, and certifiable credentials while conducting staff development for instructors and administrators. Expert manager with unique talents and diverse background in order to achieve results. Excellent communication and team building capabilities for training and professional development opportunities.

Les Perry

Senior Account Executive

Les Perry is a highly motivated and results driven Senior Sales Executive with over two decades of experience in various industries. Les moved to the Upstate of South Carolina in 1999 where he currently resides, married and father of two beautiful daughters. Les covers the state of South Carolina all verticals for GuidePoint Security.

GuidePoint Security is an elite team of highly trained, top certified experts who cut through cyber chaos and confusion to put control back in your hands. They help customers make the smartest, most informed decisions, choose and integrate products and services that are the best fit, and build the most effective cybersecurity posture through a holistic perspective of their cyber ecosystems to minimize gaps and vulnerabilities.

Les Perry's journey into the world of cybersecurity began in his pursuit of his Criminal Justice degree from Bob Jones University. He exhibited an innate desire to serve and protect people in his community.

Les Perry's impact extends beyond the confines of his professional duties. Les is known for his humility and dedication to giving back to the community. He has served in Alive Student Ministry through his local church for over a decade helping students find and follow Jesus. Les is also involved in his local Greenville ISSA and BSides communities.

Justin Scarpaci

Technical Strategist

Justin helps Managed Service and Managed Security Service Provider partners build services around the Sevco Asset Intelligence platform. He acts as the primary technical resource for all partners and works closely with the Sevco product team.Prior to Sevco,

Justin held a variety of roles in the intelligence community, military and in cybersecurity operations including technical roles at VMware Carbon Black, the United States Marine Corps, and as a contractor for the US Air Force where he defended networks in the CENTCOM area of operations.

Elaine McLeod

Program Coordinator and Professor

Elaine J. McLeod is the program coordinator for the Computer Programming Technology within the Information Systems Technology department at Midlands Technical College. Her past employment includes:
• Coordinator of Telecommunications – as the coordinator:
o she was heavily involved with the T-1 network installed at the college.
o she was responsible for the installation of an entire upgraded telephone system.
• Assistant Director, Online Learning/Educational Technology– as the assistant:
o replaced old LMS at college with BrightSpace/D2Learn.
o created and rolled out all training materials for new LMS.
o trained faculty and staff for the new LMS.
o instructional design of courses
o support for faculty for LMS
For the past 15 years, she has been in a faculty role. Since May of 2023, she has held the CPT coordinator/manager position.
Elaine is involved with:
• Leadership Lexington County
• Convent Baptist Church
• Quality Matters
• South Carolina Chapter Women in Cyber Security state officer
• Member of Women in Cyber Security national organization
Elaine’s education:
• Webster University, St. Louis, MO 1999
• Master of Arts in Computer Resources and Information Management

• University of South Carolina, Columbia, SC 1999
• Certificate of Leadership in Higher Education

• Limestone College, Gaffney, SC 1997
• Bachelor of Science in Business Administration/Management

• Midlands Technical College, Columbia, SC 1989
• Associate Degree in Computer Technology in Telecommunications Systems Management

Heath Beach

CEO Avail Strategies

Heath Beach is the co-founder and CEO of Avail Strategies, a highly respected governmental consulting firm based in Tallahassee, Florida. Before becoming a consultant, Heath most recently served as the State of Florida Deputy State Chief Information Officer/Acting State Chief Information Officer, overseeing the state data center, the state's private network, Public Safety Communications, telephone services, and more. From the beginning of his 20+ year career, he had a passion for making government better by identifying and executing on solutions, technology, and outsourcing to the private the sector. Heath continues to work with the Florida Legislature and key state agency leadership on various policies to make technology stronger for State, Local, and Education.

Mike Atkinson

Cybersecurity sales engineering leader

Cybersecurity leader with broad experience in consulting practice management, presales engineering, project management, security policy, network design, and troubleshooting. Experienced speaker and co-founder of the Chicago Security Meetup.

Dr. Joseph Fitsanakis

Professor

Dr. Joseph Fitsanakis, Ph.D., is professor of Intelligence and Security Studies at Coastal Carolina University, where he also serves as director of the Intelligence Operations Command Center. He is a member of the Academic Security and Counter Exploitation program and manages Coastal Carolina University’s Educational Partnership Agreement with the United States National Security Agency. He also serves as regional vice president for the South Carolina chapter of the InfraGard Members Alliance, a Federal Bureau of Investigation initiative for the protection of the United States’ critical infrastructure. Dr. Fitsanakis has published widely on intelligence collection, information security, cyber security, and sub-state political violence, among other topics. He has also published comparative research on intelligence agencies in southern Europe, sub-Saharan Africa, and Southeast Asia, focusing on China and North Korea. His recent scholarly publications include the books ``Aspects of Islamic Radicalization in the Balkans After the Fall of Communism`` (Peter Lang 2023, co-edited), ``Redesigning Wiretapping: The Digitization of Communications Interception`` (Springer 2020) and ``Intelligence Beyond the Anglosphere: Mediterranean and Balkan Regions`` (RIEAS 2017, co-edited). Dr. Fitsanakis is deputy director of the European Intelligence Academy and senior editor at intelNews.org, an ACI-indexed scholarly blog that is cataloged through the United States Library of Congress. Since joining Coastal Carolina University in 2015, Dr. Fitsanakis has repeatedly received the University-wide Distinguished Professor of the Year Award, the Edward College John B. Durrell Award, and the Professor of the Year Award for the Departments of Politics and Intelligence and Security Studies.

Planning Committee

Our planning committee brings decades of expertise to ensure a great event experience.

Caroline Overcash

Board Member - CyberSC

William Oden

Colonel - South Carolina State Guard

Jennye Moore

SLED Account Manager - PCMatic

Dr. Behnaz Papari

Assistant Professor - Clemson University

Tony Dillon

Director of Internship Program, Integrated Information Technology - USC Columbia

William Kintz

Senior Cyber Security Executive - Sun Management

Chris Chodora

Board Member - CyberSC

Brandon Stephens

Solutions Architect - High Point

Anthony Carbone

Cybersecurity State Advisor - CISA

Michael Holcomb

Fellow - Fluor

Lisa Carter

CEO - Spartantec

Earl Gregorich

Business Outreach and Marketing Specialist - Small Business Administration

Jake Dustan

Americas A&D Chief of Staff - EY

Vimal Patel

Founder & CEO - VTP Consultancy

Presenting Sponsor

Gold Sponsors

Silver Sponsors

Exhibitors

Supporting Partners

Exhibit and Sponsorship Opportunities