
Keynote Presentation –“Our Stalking Story”
(Cathy Holman “Prairie Wife In Heels”)
Cathy shares her family’s real-life experience with online harassment and stalking involving her daughter, and the lessons learned navigating safety, schools, and the legal system. She will also discuss how her family’s experience helped lead to legislative change in Wyoming, and how personal stories can be used to advocate for stronger laws, safer communities, and meaningful reform. This session highlights what families, educators, and communities can do when digital threats become real-world problems. Cathy will also share how she used her family’s experience to help change legislation in Wyoming, and how individuals can use their own stories to advocate for stronger laws, safer communities, and meaningful reform. *This presentation includes visuals and discussion of sensitive topics and language.

Rodney Beard (Cybersecurity consultant and vCISO)
Session: From Shadow IT to Shadow AI: Managing the Next Wave of Risk — Explore how Shadow AI emerges inside real-world organizations, why traditional security programs struggle to detect it, and how businesses can respond without stifling innovation.
Gough Galen (Jonah Bank CISO, CISSP)
Session: Human Hacked — An exploration of how cybercriminals weaponize both online and offline services to target Wyoming citizens and organizations.
Ben Halpert – Cyber Savvy Kids
Session Digital Native or Digital Naïve? —Today’s youth are growing up in a world that encourages a deep involvement with technology. Yet these same children are oftentimes unsupervised and unprepared to play safely on the digital playground—where they can very easily make bad and
potentially dangerous decisions. The adults in young people’s lives have a responsibility to guide young people, who are spending a large part of their lives immersed in the digital realm, with a comprehensive cyber safety and cyber ethics education. At this session, just for parents, Ben Halpert gives parents the tools to educate their children with the “modern street smarts” that are required for digital safety—showing parents how to engage with their children on what they are experiencing and how to empower their children to be safe by making appropriate decisions in the online world. At home, parents can further emphasize the need for privacy and the principles of Cyber Ethics, including the need to thoughtfully maintain a positive online persona and apply appropriateness and empathy to virtual decision-making.
Allie Hunter and Ben Halpert
You’re Not the Weak Link—You’re the Target: Rewriting the Human Side of Cybersecurity — This session challenges the outdated notion that people are the “weak link” in cyber incidents and instead reveals how attackers deliberately exploit human psychology to succeed. Through a compelling blend of real-world storytelling and technical insight, this session breaks down modern attack methods—including AI-driven scams, phishing, and identity manipulation—while exposing the emotional triggers (urgency, authority, fear) that make even highly capable individuals vulnerable. Attendees will gain a practical, behavior-based defense framework—the “Hunter Method”—designed to help them recognize manipulation in real time, pause instinctive reactions, and verify threats effectively across both personal and professional environments. By reframing cybersecurity as the protection of human decisions rather than just systems, this talk equips audiences with the confidence, awareness, and simple, actionable tools needed to outmaneuver today’s most sophisticated attackers.
|
|
Session: Digital Forensics as a Cross-Functional Investigative Tool: Empowering Law Enforcement, HR, Audit, and Legal Teams — Drawing from real-world cases, this session explores how digital forensic methodologies have become a critical investigative tool beyond traditional silos, supporting investigations across multiple enterprise functions such as law enforcement, human resources (HR), internal audit, and legal counsel.
Mishaal Khan (Hacker & Security Specialist)
OSINT 101 — This 2 day preconference workshop, focuses on Open Source Intelligence (OSINT) and advanced social engineering tactics. Requires an extra fee.

Cullen Landrum (Principal Solution Consultant at SailPoint)
Session: From Manual to Adaptive: Using the Horizons Maturity Model to Fast-Track Identity Security Maturity (and Shrink Your Attack Surface) — Most breaches still start with abused credentials and over-permissioned access – yet many organizations are stuck with manual, siloed identity processes. In this session, you’ll learn how to use the Horizons maturity model to quickly baseline where your identity program is today, and identify the “next horizon” capabilities that matter most.

Terri Markum(Co-founder and executive director of Uprising)
Session: The Human Side of Cybercrime: Online Exploitation Trends Impacting Youth and Communities. — Drawing from prevention work with youth and communities across Wyoming, this session explores how offenders exploit digital environments to manipulate, coerce, and financially exploit victims. This session will help cybersecurity professionals better understand the human element of cybercrime and how awareness, prevention, and early intervention can reduce harm.
Josh Mason (Cybersecurity Consultant)
Session 1: Speak Security with a Business Accent — Training technical pros to frame risks in terms of revenue and reputation.
Session 2 (Workshop): The 15-Minute MBA for Cyber Pros — Practicing high-level pitches to CFOs and Boards of Directors.
Author of Speak Security With A Business Accent.
Mike Morrison (Chief Information Security Officer for the Zendus Group)
Session 1: AI Governance Without Handbrakes: Enabling Innovation While Managing Real Risk —Explore how organizations can design AI governance programs that align accountability, risk appetite, and technical safeguards without discouraging adoption. Drawing on NIST and ISO standards, we’ll cover AI use‑case registration, decision‑critical risk tiering, third‑party AI governance, and human‑in‑the‑loop controls that protect the organization while allowing teams to move fast with AI.
Session 2: The Rules of the Road for AI: How to Move Fast Without Crashing AI use at work isn’t a toy; it’s a powerful tool that needs the right guardrails. Learn how to assess risk, protect sensitive data, and use AI as an employee in ways that help your organization while keeping you, and your employer, protected.
Phil Plantamura (COO, Security Onion Solutions)
Session: Peeling Back the Layers of Your Enterprise — A beginner-friendly
session on using the Security Onion free and open platform for network
visibility and threat hunting.
Debra Richardson (Accounts Payable & Vendor Specialist)
Debra will be providing a comprehensive look at the intersection of finance, procurement, and cybersecurity through several sessions:
Procurement & Vendor Risks: Identifying the “hidden cyber gap” in vendor onboarding and data maintenance that allows fraudsters to redirect payments without a technical breach.
The “Human Firewall” Evolution: Explaining why relying solely on finance teams to spot red flags is no longer sustainable and how to build automated, layered defenses.
Higher Education Focus: A specific look at Business Email Compromise (BEC) within decentralized university environments.
Email Fraud Deep Dive: A tactical review of fraudulent emails from late 2024 and tools to combat evolving social engineering tactics.
Kyla Smith (Cybersecurity Analyst at Riverside Community College District in California)
From Assessment to Assurance: Applying the HECVAT to Third-Party Risk in Higher Education —Explore how higher education institutions can operationalize Third-Party Risk Management (TPRM) using the Higher Education Community Vendor Assessment Toolkit (HECVAT) as a practical, scalable foundation.

Glen Sorenson (Privacy Expert for DeleteMe & former Casper College student)
Workshop: Burn the Trail — A hands-on, 4-hour session where attendees learn to reduce their personal digital footprint (PII) to defend against AI-driven social engineering.
Session: The High Performance Fuel for Social Engineering (Now in AI Flavors!) Every day, millions of data points about YOU, regardless of your intent or awareness and whether public, leaked, scraped, or sold, are quietly feeding into an ecosystem (largely legal) of personal information. Threat actors, now often trivially, use AI tools to weaponize that personal information at scale against both individuals and their organizations. What once required a non-trivial skillset in OSINT and social engineering can now be executed by anyone with a prompt and a profile or scraped data set – or worse, a team of AI agents.
Peter Warmka (Ret. CIA Intelligence Officer)
Session 1: The Traitor’s Playbook — Analyzing famous espionage cases (Ames, Hanssen) through the “Fraud Triangle” to help organizations spot insider threats.
Session 2: When the Banker Gets Butchered — A case study on “pig-butchering” scams, specifically focusing on the CEO of Heartland Tri-State Bank who was manipulated into transferring millions.


Clifford Stokes, (Director of Information Security at Florida State University.)

