This event is now complete

Agenda

Wed 12 Nov 2025

View event details
7:20AM

Registration and Networking Coffee

7:20 AM - 8:20 AM (60 mins)

8:20AM

Welcome from the Public Sector Network

8:20 AM - 8:30 AM (10 mins)

Neil Ashman Head of Sales US, Public Sector Network
8:30AM

Opening Remarks from the Chair

8:30 AM - 8:40 AM (10 mins)

Tim Chase Principal Technical Evangalist, Orca Security
8:40AM
Fireside Chat

Beyond the Breach: Tackling Cyber Resilience Gaps Across Texas’ Public Sector

8:40 AM - 9:05 AM (25 mins)

Chris Bunton Chief Information Officer, Texas Department of Agriculture
Tim Chase Principal Technical Evangalist, Orca Security

As ransomware attacks escalate, state-sponsored threats grow bolder, and critical infrastructure systems age, Texas faces a complex and evolving cybersecurity landscape. This panel brings together public sector leaders to discuss how agencies are tackling deep-rooted vulnerabilities—such as legacy infrastructure, fragmented coordination, and insufficient breach readiness—while striving for a more unified and resilient cybersecurity future.

  • Modernizing Legacy Systems Without Disruption: How can state agencies balance modernization with service continuity?
  • Strengthening Interagency Collaboration: What mechanisms are in place—or needed—to ensure real-time threat intelligence sharing, coordinated response, and standardized cybersecurity protocols across local and state government?
  • Securing Healthcare and Citizen Data at Scale: In light of large-scale breaches affecting millions, how are agencies addressing gaps in data security and privacy protections across health and human services?
  • Preparing for Nation-State Threats and APTs: How are Texas agencies adapting their cybersecurity postures in response to complex, politically motivated cyber threats, such as those seen with Volt Typhoon and CARR?
9:05AM
Industry Insights

From Data Overload to Decisive Action: Advancing Risk-Centric Cybersecurity for State & Local Governments

9:05 AM - 9:25 AM (20 mins)

Nate Cain Major Accounts Solution Architect, Public Sector Sales, Qualys

Effective cybersecurity requires more than finding risks - it demands prioritized action that reduces exposure. Faced with limited resources and rising cyber mandates, state and local governments can’t afford multiple point tools, technical debt, or audit fatigue. In this session, we will explore how agencies can shift from reactive security to a risk-centric approach - turning overwhelming volumes of alerts into prioritized, actionable insights. Learn how Qualys - now FedRAMP High Authorized, the only full-spectrum risk management platform validated at this level - empowers governments to embedding mission context, unify visibility by consolidating siloed tools, prioritize with TruRisk™ and automate compliance. Discover how a holistic, risk-centric approach empowers state and local government teams to optimize resources, protect critical services, and measurably reduces cyber risk at scale.

9:25AM
Keynote

AI and Machine Learning in Cybersecurity

9:25 AM - 9:45 AM (20 mins)

Fred Lover Professor, Cybersecurity, Austin Community College

AI in cybersecurity enhances threat detection and response with machine learning, offers significant operational benefits, faces technical and implementation challenges, and continues to evolve through emerging trends and future developments.

  • -AI/ML Threat Detection and Response Capabilities: What capabilities do machine learning algorithms provide for modern cybersecurity or incident response?
  • Implementation Benefits and Operational Advantages: What are the key benefits and advantages of using AI in cybersecurity and threat detection?
  • Technical and Operational Challenges: What are the main challenges, limitations, or hurdles organizations face when implementing and maintaining AI-powered cybersecurity systems?
  • Emerging Trends and Future Developments: What are the key emerging trends and future developments shaping the cybersecurity landscape?
9:45AM
Industry Insights

“Chunk Up” Passwords and Networks - Protect Your Organization, Your People, and Your Reputation

9:45 AM - 10:05 AM (20 mins)

Tom Hines Chief Operating Officer, Circle Security

As organizations modernize their security posture, two root causes demand focus: passwords/credentials and discoverable networks. This session outlines a practical path to remove these barriers, make services non-scannable, and “chunk up” change through low-risk pilots that measurably cut incidents, speed access, and simplify compliance.

  • Eliminate Shared Secrets: Replace passwords with device-bound, passwordless authentication to reduce phishing, credential attacks, and help-desk resets.
  • Go Non-Discoverable: Prevent scanning and lateral movement by configuring internal services invisible-by-default and reachable only from trusted devices.
  • Deliver: SaaS protection and internal and external device protection.
  • Operational Upside: Improve user experience, shrink audit scope, and align identity, network, and endpoint teams around a simpler control plane.
10:05AM
Keynote

Beyond Borders, Beyond Silos: Advancing Cybersecurity Through Shared Purpose

10:05 AM - 10:30 AM (25 mins)

Dan Wilkins Chief Information Security Officer, Arizona Department of Economic Security

A cross-state perspective on defending the digital frontlines. Drawing from Arizona’s real-world experiences in securing economic and human services systems, he underscores the value of collaboration, threat intelligence sharing, and ecosystem thinking. This session challenges Texas leaders to look beyond jurisdictional lines and embrace a national mindset—because in cybersecurity, progress anywhere strengthens security everywhere.

  • Cybersecurity Without Borders: Highlight the interdependence of state systems across the country, and why collaboration between states like Arizona and Texas can elevate collective defense against evolving threats.
  • Economic and Human Services Under Siege: Share Arizona’s lessons in securing vital public services—including unemployment systems, benefits portals, and citizen-facing platforms—with relevance to Texas’ own digital infrastructure.
  • Bridging the Talent Gap: Discuss cross-state strategies for strengthening the cybersecurity workforce, from joint training programs to public-private upskilling initiatives, and how these models can inspire Texas partnerships.
  • Call to Action for a United Front: Encourage Texas agencies and partners to double down on information-sharing, cross-agency coordination, and proactive investment—framing cybersecurity as a mission shared not just across sectors, but across state lines.
10:30AM

Morning Coffee and Networking Break

10:30 AM - 11:00 AM (30 mins)

11:00AM
Roundtables

Interactive Cybersecurity Collaboration

11:00 AM - 12:00 PM (60 mins)

Roundtable 1: Generative AI: The Double-Edged Sword in Cyber Defense Facilitated by: Tim Chase, Principal Technical Evangalist, Orca Security

Roundtable 2: Building Resilient Cyber Defenses for State & Local Governments: Harnessing AI-Driven Risk Prioritization and Automated Response Facilitated by: Nate Cain, Major Accounts Solutions Architect, Qualys

Roundtable 3: Invisible Defense – The Future of Access and Network Defense Facilitated by: Tom Hines, COO, Circle Security

Roundtable 4: Bridging the Trust Gap: Building Confidence in Working with the Ethical Hacking Community Facilitated by: Terry Marks, Sr. Sales Manager Public Sector, HackerOne

12:00PM
Panel discussion

Closing the Cyber Talent Gap: Building a Resilient Workforce for Texas' Digital Future

12:00 PM - 12:30 PM (30 mins)

Despite bold investments in infrastructure and policy, Texas’ cybersecurity resilience hinges on a less visible but deeply critical issue—the shortage of skilled professionals to protect and defend the state’s digital frontlines. This keynote dives into how Texas is building its cyber workforce pipeline, modernizing training, and aligning education with operational needs across the public sector.

  • The Scope of the Problem: Outline the workforce shortage across Texas agencies, its impact on response capabilities, and projections for future demand in both urban and rural jurisdictions.
  • Growing Talent at Home: Highlight partnerships between state government, universities, and technical schools to build localized cyber workforce pipelines (e.g., through apprenticeships, certifications, and Texas’ cyber-focused higher ed programs).
  • Modernizing Training and Recruitment: Showcase new efforts in upskilling government employees, creating reskilling pathways for veterans and career changers, and making cybersecurity careers more accessible and attractive.
  • Institutionalizing Workforce Resilience: Discuss how the State Cybersecurity Strategic Plan (2024–2028) embeds workforce development into broader cyber readiness goals, ensuring Texas is not just filling seats—but cultivating leaders.
Brian Gardner
Chief Information Security Officer, City of Austin
Nathan Haselhorst
Information Security Officer, Office of State Administration, Texas Military Department
Michael McKinley
Sr. Solution Engineer, HackerOne
Tim Chase Moderator
Principal Technical Evangalist, Orca Security
12:30PM
Industry Insights

From Tick Box Compliance to Resilience

12:30 PM - 12:50 PM (20 mins)

Dane Meah Chief Executive Officer, MyCISO

Texas agencies are meeting their compliance obligations - but compliance alone doesn't equal resilience. This session unpacks how state and local entities can evolve from tick-box cybersecurity to measurable, outcome-driven resilience that protects citizen services and public trust. What you'll learn:

  • The Resilience Scale: How to progress from compliance and maturity tracking to true operational resilience.
  • Why Tick-Box Thinking Fails: Why meeting the standard isn't the same as being secure.
  • Metrics That Matter: How outcome-driven metrics reveal control effectiveness and impact.
  • Driving Resilience with Data: Using incident insights and effectiveness metrics to target and uplift the key areas that build resilience.
12:50PM

Closing Remarks from Chair

12:50 PM - 1:00 PM (10 mins)

Tim Chase Principal Technical Evangalist, Orca Security
1:00PM

Networking Lunch

1:00 PM - 2:00 PM (60 mins)

Questions?

See our FAQs or get in touch