Bill Bowman

Topic: Breaking into the Boardroom
Abstract
To be provided.
About Bill Bowman
To be provided.
Rob Black, CISSP

Topic: Communicating Cyber Risk: How to Speak the Language of Business
Abstract
What do you think is more compelling to company leadership? "There's a high chance of an expensive CRM compromise," or "There's a 20% chance of a CRM compromise that will cost us $3 million."
It's the latter. Executive teams and boards of directors speak the language of business: money!
You can better communicate cyber risk with your leadership by turning the "highs," "mediums," and "lows," of your cyber risk assessment into quantified values of dollars and probabilities.
This session will help cybersecurity leaders earn executive and board buy-in to their initiatives by demonstrating how they can conduct a quantitative risk assessment, and how to use that risk assessment to make a smart board presentation that effectively communicates cyber risk and persuades them to support their security initiatives.
About Rob Black, CEO and Founder, Fractional CISO
Rob Black is the CEO and Founder of Fractional CISO, a Virtual CISO firm specialized in helping midmarket companies start and scale their cybersecurity program to meet the demands of their enterprise customers. He has held product and corporate security positions at PTC ThingWorx, Axeda, and RSA Security - where he participated in the response and recovery of a cyber attack conducted by an adversarial nation state. You may have seen him on LinkedIn, where he publishes short, comedic, and educational GRC videos to hundreds of thousands of viewers each year.
Robert Siciliano

Topic: The Strategic Human Firewall™: Identifying AI and Social Engineering Digital Deception Attacks
Abstract
The Human Blindspot™: The psychological instinct to trust the familiar. The cognitive gap where biological trust overrides digital suspicion, leaving the door open for AI-enhanced deception.
The Strategic Human Firewall™: Blocks deception. A proactive governance mindset that turns employees from passive targets into an active detection layer. It is the shift from 'I trust what I see' to 'I verify everything.'
Let’s be real: You don't need another lecture on complex algorithms or "network encryption." You need to know how to stop a criminal from stealing your life, your money, and your reputation. The game has changed. We aren't just dealing with simple email scams anymore; we are facing AI-driven fraud, deepfakes that look like your boss, and voice clones that sound like your family. It’s enough to make anyone paranoid—but I’m not here to scare you. I’m here to arm you.
About Robert Siciliano
I’m Robert Siciliano. I’m not your typical "IT guy." I’m a former Private Investigator and a Coast Guard Auxilarist. I don't look at security through code; I look at it through the eyes of the criminal. I’ve spent my career tracking how bad guys operate—both online and in the physical world—and I know exactly how to shut them down.
I’ve trained thousands of real estate agents, bankers, and financial leaders on Cyber Security Employee Training who thought they were "safe enough." They weren't. I teach your coworkers that cyber security is personal security. Whether it’s a physical threat at an open house or a digital thief in your bank account, the defense is the same: You.
My goal is simple: I want you to walk out of this room smarter, faster, and harder to hit than you were when you walked in. We’re going to build a Strategic Human Firewall™—and we’re going to do it without a single line of code.
Sunil Anand
Topic: AI: The New Target, The New Shield
Abstract
Ever wondered if the AI you use every day could be hacked — or if it could help stop the next big cyberattack? Join us as we explore both sides of the story: how AI is becoming a target for attackers, and how it’s quickly becoming one of the best tools defenders have. No deep tech background needed — just curiosity. Walk away knowing: what’s at stake, what’s already happening, and simple ways to stay a step ahead.
About Sunil Anand
- More than 20 years of diverse experience in architecture, design and development of web application products based on the Java platform.
- More than 10 years of experience in providing Architecture Services in the area of Information Security, Application Security Assessment, Risk Management, Governance, Risk and Compliance and supporting leading standards like NIST, OWASP, WASC, BSIMM and OSTMM.
- Expertise in IT Services Business Optimization, Value Creation, P&L Management, Large IT Services Deals, vendor and complex customer engagement experiences.
- 1st Certified Networked Defender in APAC, Certified Ethical Hacker and Secure SDLC practitioner from last 10 years, and member of OWASP Delhi Chapter and Data Security Council of India.
- Extensive experience in TOGAF, ZACHMAN and FEAF Frameworks.
- Expertise in design, development and maintenance of world-class Security solutions. Holistic approach towards architecture process, creating reference security architectures for various business domains, application, performance and security architecture for high volume, large scale enterprise applications.
- Extensive experience in Application Security, Vulnerability Analysis and Penetration Testing, Vulnerability Management, Enterprise Risk Score Assessment.
- Extensive experience in implementing Confidentiality, Integrity and Availability requirements using Cryptography and PKI solutions including encryption, hashing, certificates and digital signatures.
Christine Nagy

Topic: Lessons of a CISO
Abstract
From high-stakes negotiations to crisis management and the importance of mental health.
About Christine Nagy
To be provided.
Morning Networking: Friendly 9-Hole Golf
Before the main event, join your colleagues for a casual round of golf. This is a "just for fun" networking opportunity—keep your own score and enjoy the fresh air!
- Start Time: Approximately 7:00 AM (Dave Dumas will confirm specific tee times).
- Cost: Approximately $48 (payable directly to the clubhouse upon arrival). Includes 9 holes and a cart.
- Equipment: Bring your own clubs or rent a set at the clubhouse for an additional fee.
How to Join:
- Check the "9-holes of golf" box when you register online.
- Email Dave Dumas at ddumas@issa-ne.org to confirm your spot so we can secure enough start times.
Golf Sponsorship Opportunity
Are you a Chapter Sponsor? If you would like to sponsor a group of members for the morning golf session, please contact Joe Viellenave at jviellenave@issa-ne.org. This is a fantastic way to gain additional visibility and support the community.
Note: This is an additional payment beyond your standard annual sponsorship.


