Agency Partners
US Secret Service, FBI Cyber Division, DHS-CISA, HSI, etc.
Panels, presentations, investigation insights and case studies
Associations Invited
ISACA, InfraGard, ISSA, ISC2, CSA, IAFCI, ACAMS
Inviting members from all local chapters, and providing input on the agenda
Overview
Succinct presentations will focus on topics that give cyber leaders immediately actionable insights. Moderated discussion will follow each topic, with streamlined talking points to maximize audience take-aways.
The Forum is Graciously Supported by Solution Providers
As a community-first gathering, supporting organizations do NOT get registration information, and post-event communications will be limited to details requested by participants.
Richard Stiennon
Chief Research Analyst, Former Gartner Research VP, Author, Cyber Board Advisor
Profound insights on the entirety of the cybersecurity industry, trends to expect in 2025, and analysis of emerging areas and products
Pamela Gupta
Chief AI Governance, AI Trust Officer, CISO, Global Risk Management Influencer
Managing AI cybersecurity, privacy, ethics, accountability risks to achieve intended outcomes, specifically safe, secure, and trustworthy AI
Dr. Frederick Scholl
Quinnipiac University - Program Director Cyber & Associate Teaching Professor
Postulating a better connection for industry and academic in cybersecurity, with specific focus on regulated industries lie financial services and healthcare
Tim Rohrbaugh
Principal, LLM Strategic Solutions & CISOonCall, 3x Public Co. CISO
Applied GenAI for Cybersecurity, a discussion of in-house LLMs - focus on using the strengths of AI to positively affect security operations
Ira Winkler
Award winning CISO, top-rated keynote speaker & bestselling author
A frank disucssion on the mistakes most CISOs are making when it comes to the cybersecurity budget, planning, hiring, and purchasing processes
Gavin A. Grounds
Artificial intelligence (AI) is reshaping the landscape of cybersecurity governance, risk, and compliance (GRC), presenting both transformative opportunities and complex challenges. This session addresses the critical question facing executives: how can we harness the innovative potential of AI while managing its inherent risks and meeting regulatory demands?
Dr. Mehdi Mekni
Prof., Comp. Sci. & Cybersecurity
Dir., Comp. Sci. Program
Faculty Fellow, CT Institute of Technology, (CIT) - UNH
Dr. Chad Williams
Chair, Computer Science - Central Connecticut State University
Suzette Leal
FVP, Chief Information Security Officer - Ion Bank
Brian Kelly
Director of Information Security, Community Health Network of CT
Justin Hickey
Deputy CISO
State of Connecticut
Dennis Klemenz
CIO
Jovia Financial Credit Union
✓ Cyber industry trends with respect to vendors, investment, product sprawl for 2025 planning
✓ AI: Securing products, ensuring safety and trustworthiness
✓ Case studies from law enforcement agencies, focusing on recent trends
✓ Current prevalence of AI-based cyber attacks, intrusions, response, etc.
✓ The convergence of fraud prevention/risk management and cybersecurity
✓ Zero Trust, what it means in the context of risk strategy vs products & services
Chief Research Analyst, IT-Harvest
There are literally thousands of Solution Providers in the cybersecurity and fraud fighting space. Richard Stienen is the former VP of Research for Gartner, and has spent decades analyzing the security industry. Since leaving Gartner, he has been an analyst, lecturer and industry pundit. More recently, his firm IT Harvest has set about cataloging and understanding the breadth and depth of the global vendor landscape. In this discussion, Richard will share some of the key insights in his forthcomig book "The Cybersecurity Yearbook 2025," which follows successful updates of the book since 2020.
Leaders will learn from this session how best to categorize and understand product offerings, helping them tune their thinking around which solutions and products will be most helpful to their securuty, AML, KYC and third-party risk mitigation programs.
CEO, Trusted AI
Founder NEACS
De-Risking AI Adoption to promote AI Value
As AI rapidly advances, it brings both opportunities and critical risks that demand robust cybersecurity and resilience measures. This keynote explores the pivotal role of cybersecurity in ensuring AI systems remain safe, fair, and secure—addressing concerns like bias, privacy, and discrimination. To harness AI responsibly, organizations must uphold stringent standards for safety, human rights, and risk mitigation.
Panelists:
Universities (like our gracious host, Quinnipiac) offer both undergrad and graduate degrees in “Cybersecurity,” Many CISOs are asking “What does a recent cybersecurity graduate do for me?” Do they work in the SOC? Are they prepared for leadership roles? How do I best fill those entry-level roles I need on my team? In this session, cybersecurity professors will discuss what is included in the programs, and how to best utilize these recent grads in your fraud-fighting or cybersecurity staff.
The biggest challenge to filling cyber jobs is the reluctance of industry to offer meaningful training opportunities to students, before they graduate. This is still an unsolved problem, even though people and groups are working on it. In this panel of local CISO Executives and University Professors, we will debate the issue and suggest solutions.
In this discussion pod, Tim will demystify the overused term “AI,” and focus on what is really NEW. He will expand on where the hype is real and where it’s not. Participants will leave with better clarity: what this tech means, inherent risks, how to avoid the weaknesses and focus on using the strengths to positively affect security operations (and beyond). You may want to be an Applied GenAI Engineer by the end of this segment!
Applied GenAI for Cybersecurity, a discussion of In-House LLMs and demystifying “AI”, inherent risks, focus on using the strengths to positively affect security operations
Explore the historical influence of horse-drawn carts on railcar dimensions and how it relates to rigid cybersecurity budgeting. Join this session to learn how to apply machine learning and other mathematical concepts to justify budget allocation, optimize risk, and design effective cybersecurity programs for limited resources.
Partner
Mullen Coughlin LLC
FBI Criminal Investigative Division, IC3
(to be confirmed)
The legal perspective around ransomware incidents is discussed often, and NEACS invited an expert attorney in the field to share some fascinating and insightful data points that you will remember long after the agenda concludes today. Cyber is the singular focus for Mullen Coughlin, a law firm that handled over 14,000 incidents between 2020 and 2023. Gregory Bautista is a Partner, and brings a wealth of intelligence related to incident response, privacy litigation, and regulatory investigation defense.
We will hear from numerous agencies from the federal and state governments, all charged with education, information and/or enforcement around fraud and cyber. Our tax dollars at work, they provide a plethora of services and direct help for private and public sector organizations.
In this discussion, we will hear from some of the CISOs who have been leveraging intelligence, education, and services from those agencies as well as leaders from within CISA, the FBI and the State Fusion Center. They will discuss how they have been working together in recent years, and suggest ways in which the private sector and government agencies can learn from each other.
FBI Criminal Investigative Division, IC3
IC3's mission is to provide the public with a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation concerning suspected Internet-facilitated criminal activity and to develop effective alliances with law enforcement and industry partners. Information is analyzed and disseminated for investigative and intelligence purposes to law enforcement and for public awareness.
Look for detailed data that will help security leaders as they think crtically about today's biggest threats
Gavin A. Grounds, Co-Founder, Mercury Risk & Compliance
Grace Beason, Co-Founder, Mercury Risk & Compliance
Artificial intelligence (AI) is reshaping the landscape of cybersecurity governance, risk, and compliance (GRC), presenting both transformative opportunities and complex challenges. This session addresses the critical question facing executives: how can we harness the innovative potential of AI while managing its inherent risks and meeting regulatory demands?
Leveraging insights from leading industry analysts and research groups, this presentation explores the dual role of generative AI as a strategic asset and a governance challenge. Attendees will gain actionable strategies to establish governance frameworks that scale with AI's rapid evolution, manage third-party risks effectively, and align AI initiatives with organizational priorities.
Michael Hiskey, Community Organizer, CxO Security Forum
(no Sales, Marketing, Business Development!)