GPSEC_WHITE_TEXT_RGB.png

Thursday, October 2, 2025 | 8:00am – 4:00pm CT | Frisco, TX

VENUE: Omni PGA Frisco Resort
4341 PGA Pkwy, Frisco, TX 75033

Click Here to Return to the Registration Page

Register Now

GuidePoint Security welcomes you to our national, industry leading cybersecurity conference, GPSEC in DFW.

This collaborative conference will be focused on your current security challenges - complete with exciting keynote speakers, breakfast, vendor fair, breakout sessions, lunch and more!  All this at zero cost to attend.

Join us at the Omni PGA for a day of insightful discussions with industry leaders and experts who play pivotal roles in shaping the cybersecurity landscape. This event promises engaging conversations on a variety of topics. 

Please view our agenda below.

Breakout Sessions:
AI-Enabled Adversaries: How Threat Actors Are (Mis)using AI
Victor Wieczorek, SVP, Offensive Security, GuidePoint Security
In this session, Victor explores how threat actors are actually using AI in the wild, cutting through the hype to reveal what's really happening. Through real-world examples, he demonstrates both the emerging threats and the surprising limitations of AI-enabled attacks. Attendees will discover how the same AI capabilities empowering adversaries can strengthen defenders. This isn't about fear-mongering or pitches; it's an honest look at navigating cybersecurity in an AI-saturated world where the tools keep evolving, but human judgement remains the critical differentiator.

All Roads Lead to SOC Transformation - XSIAM
Yves-Laurent Sivuilu, Global Leader, WW Transformation Success, Palo Alto Networks
Security teams in 2025 are faced with a number of challenges: manual investigations across siloed tools, the advent of AI-enabled cyberattacks, cybersecurity talent shortages, and more. Most security teams spend the majority of their time balancing between XDR tools (EDR, NDR, CDR, UEBA), SIEM and SOAR products. In 2022, Palo Alto broke from the traditional vendor approach and developed a truly unique Autonomous SOC Platform, XSIAM. XSIAM is the convergence of XDR, SIEM, and SOAR within one platform.

Putting the "R" Back in TPRM
Patrick Vern, Managing Security Consultant, GuidePoint Security
Patrick Hynes, Safe Security
Traditional Third-Party Risk Management (TPRM) approaches often focus on compliance and check-the-box exercises, but neglect the critical aspect of risk management. This presentation will challenge the status quo by highlighting the importance of integrating risk assessment and mitigation strategies into TPRM programs. By putting the "R" back in TPRM, organizations can move beyond mere compliance and towards a more proactive approach to managing third-party risk, ultimately reducing exposure and improving overall resilience.

Invisible Traffic, Visible Risk: Ai Agents, MCP Servers and the API Fabric Powering Organizations
Nick Rago, VP Product Strategy, Salt Security
As organizations race to embrace Agentic AI, they are deploying AI agents and Model Context Protocol (MCP) servers at unprecedented speed. These systems promise business transformations but they also bring an explosion of API traffic, often outside of traditional security visibility. Every AI agent is powered by APIs, and every MCP server is essentially an API broker. Without the ability to discover, govern, and protect this new wave of API interactions, organizations risk shadow AI deployments, posture gaps, and breaches that existing tools simply can't stop. In this session, Nick will share how Agentic AI is reshaping the attack surface, why API security has become the fourth pillar of cybersecurity, and what steps CISOs and their teams must take now to safeguard their businesses.

Securing OT/ICS Environments
Skip Sorrels, Senior Director, Principal Healthcare, Claroty
Daniel Gaeta & Nikki Hegdahl, GuidePoint Security
We all rely on ICS/OT systems to provide power, water, and critical infrastructure, yet many of these systems are highly vulnerable to exploitation. Attend this presentation to learn more about what ICS/OT security is, the threat landscape, security priorities, the IT/OT convergence and digital transformation, OT environment vulnerabilities, five critical controls to build an ICS/OT security program, and next steps.

EVENT AGENDA

8:00 a.m. – 9:00 a.m.

Registration and Breakfast

9:00 a.m. – 10:00 a.m.

Welcome & Opening General Session
CISO Panel hosted by GuidePoint Security CISO, Gary Brickhouse

10:15 a.m. – 10:45 a.m.

Breakout Sessions Choose the session most aligned to your role.

  • What your CEO Wishes You Knew about Cyber Law & Insurance - Nate Spurrier, Vice President of Insurance and Cyber Strategy, GuidePoint Security and Josh Arnold, Claims Team Lead, Cowbell Insurance
  • The Convergence of AI Governance with Data Security and Data Privacy - Jim Packer, Practice Lead - Data Security, Privacy and AI Governance, GuidePoint Security
  • Cloud Security Maturity Framework - Prateek Goel, Business Value Leader, Wiz

11:00 a.m. – 11:30 a.m.

Breakout Sessions Choose the session most aligned to your role.

  • Beneath the Surface: Navigating Today's Cyber Threat Landscape - Jake Plant, Strategic Delivery Manager, DFIR & GRIT, GuidePoint Security
  • CrowdStrike
  • Cyera

11:45 a.m. – 12:15 p.m

Breakout Sessions Choose the session most aligned to your role.

  • DSPM Day 2: You found your data. Now what? - Terry Cordes, Senior Security Consultant, GuidePoint Security
  • Victor Wieczorek, SVP, Offensive Security, GuidePoint Security
  • Palo Alto Networks

12:15 p.m. – 1:30 p.m

Lunch featuring special guest, Bo Jackson

1:45 p.m. – 2:15 p.m

Breakout Sessions Choose the session most aligned to your role.

  • Completing the Identity Picture - a panel moderated by Kevin Converse, GuidePoint Security featuring Astrix, Delinea & Saviynt
  • Transform your sprawling SaaS environment from a security liability into a business advantage - Reco Security and Jonathan Villa, Cloud Security, GuidePoint Security
  • Creating cyber instincts like physical security - Buckle Up for Better Clicks: Making Cyber Security as Instinctive as Seatbelts - Brittany Little, Cyber Security Manager, Copart and Danielle Chade, Cyber Security Engineer, Copart

2:30 p.m. – 3:00 p.m

Breakout Sessions Choose the session most aligned to your role.

  • Securing OT/ICS Environments - Daniel Gaeta & Nikki Hegdahl, GuidePoint Security and Skip Sorrels, Security Director, Principal Healthcare, Claroty
  • Putting the 'R' Back in TPRM: Truly Managing Your Third Party Risk - Patrick Hynes, Risk Advisor, Safe Security and Patrick Vern, Managing Security Consultant, GuidePoint Security

3:00 p.m. – 4:00 p.m

Happy Hour at Omni PGA

2:00 p.m. – 5:00 p.m
Title Sponsor Presentation Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incidi abore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ulla.

FEATURED SPEAKERS

Yotam Segev Headshot.png

Yotam Segev, Co-Founder and CEO, Cyera
Yotam is the Co-Founder and CEO of Cyera.  Prior to Cyera, alongside his Co-Founder, Tamar Bar-Ilan, built and ran the cloud security division for the Israeli Defense Force's IDF elite Unit 8200, and served as a Senior Class Commander in the IDF's prestigious Talpiot Leadership Academy.  During this time, Segev gained firsthand experience leading teams and deploying cybersecurity technologies in the field. He also gained valuable insight to recognize the challenges involved in ensuring business stakeholders have access to critical, sensitive data in a secure manner, and the need to develop a solution. These insights inspired Segev and Bar-Ilan to found Cyera in 2021, and continue to fuel the company's rapid growth.  As CEO, Segev leads strategic direction and operations, and guides the company to develop technology and tools through customer-inspired innovation.

Nate Spurrier headshot.jpg

Nate Spurrier, Vice President of Insurance and Cyber Strategy, GuidePoint Security
Nate is the Vice President of Insurance and Counsel Strategy for GuidePoint Security. Nate has over 15 years experience working within the cyber insurance industry. Between helping insurance companies build cyber insurance offerings, training insurance agents on how to sell cyber insurance , and assisting the largest companies in the world respond to breaches, Nate has the ability to capture a wide range of topics and questions within the cyber insurance and breach response landscape.

Headshot_Victor_Wieczorek_GPS_New.png

Victor Wieczorek, SVP, Offensive Security, GuidePoint Security
Victor Wieczorek is an offensive security specialist that leads the Application Security and Threat & Attack Simulation practices at GuidePoint Security. His expertise includes penetration testing, red teaming, social engineering across broad domains including application, cloud, and traditional, on-premises networks. Victor leverages his many years of hands-on technical experience to integrate leading-edge capabilities into a world-class team of highly technical consultants, operators, and managers.

Gary_Brickhouse_Headshot_2019-150x150_Circle.png

Gary Brickhouse, CISO, GuidePoint Security
Gary Brickhouse, CISO & VP of GRC Services at GuidePoint Security, began his career in the security industry in 2001.  Gary is GuidePoint’s internal CISO and is responsible for all aspects of the company’s information security program, inclusive of building and maintaining GuidePoint’s internal security architecture and control practices.  Gary also leads the GRC Services consulting practice where he is responsible for the development and delivery of GRC service offerings to support our clients.  This unique position allows Gary greater visibility into customer needs from an industry services perspective and also as a practitioner, addressing the same risks for GuidePoint.

Skip Sorrels.jpg

Skip Sorrels, Field CTO, CISO, Claroty
Skip is a distinguished cybersecurity professional widely acclaimed for his leadership in crafting robust cybersecurity programs. Armed with a Master of Science in Cybersecurity and Information Assurance, he boasts a unique amalgamation of technical expertise and a solid foundation in healthcare cybersecurity. Skip's twenty-five year plus career trajectory came full circle, commencing in the nursing profession in Texas, where he navigated intensive care, trauma units, and transplant teams. his fascination with computers and technology eventually led him to Dell, where he significantly contributed to the architecture and solutioning for Department of Defense contracts and military branches.

Aaron Ausherman 2.jpg

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

THANK YOU TO OUR SPONSORS

PRESENTING

Mkto_Cyera_Logo.jpeg

BREAKOUT SESSION

Mkto_CrowdStrike_Logo.png

Mkto_Hoxhunt_Logo.png

Mkto_Palo_Alto_Networks_Logo.png

Mkto_Wiz_Logo.png

Mkto_V2_Astrix_Logo.png

Mkto_Safe_Logo.png

Mkto_Claroty_Logo.png

Mkto_V2_Reco_Logo.png

Mkto_Delinea_2_Logo.jpg

Mkto_Saviynt_Logo.png

Mkto_Salt_Security_Logo.png

INNOVATION ALLEY

Mkto_V2_Dune_Logo.png

Mkto_Valence_Logo.png

Mkto_Prompt_Logo.png

Mkto_Qwiet_Logo.png

Mkto_Push_Logo.png

Mkto_V2_Doppel_Logo.png

Mkto_Zenity_Logo.png

Mkto_Witness_AI_Logo.png

Mkto_Mitiga_Logo.png

Mkto_DataBahn_Logo.png

Mkto_Observo_Logo.png

Mkto_BlackCloack_V2_Logo.png

Mkto_BforeAI_Logo.png

Mkto_Sentra_Logo.png

Mkto_hackerone_Logo.png

EXHIBITORS

Mkto_Oasis_Security_Logo.png

BlackDuckLogo.png

Mkto_Rapid7_Logo.png

Mkto_Cloudflare_Logo.png

Mkto_BigID_V2_Logo.png

Mkto_Apiiro_Logo.png

Mkto_V3_Orca_Logo.png

Mkto_SNYK_Logo.png

Mkto_Expel_Logo.png

Mkto_Akamai_Logo.png

Mkto_Trellix_Logo.png

Mkto_Varonis_Logo.png

Mkto_F5_Logo.png

Mkto_Tenable_Network_Security_Logo.png

Mkto_Google_Cloud_Logo.png

Mkto_Seraphic_Logo.png


Mkto_Silverfort_Logo copy.jpg

Mkto_Tines_Logo_2.png

Mkto_Fortinet_Logo.png

Mkto_ReliaQuest_Logo.png

Mkto_Living_Security_Logo.png

Mkto_Critical_Start_Logo.png

Mkto_Proofpoint_Logo.png

Mkto_Netskope_Logo.png

Mkto_V2_Concentric_AI_Logo.png

Mkto_Abnormal_Security_Logo_Black.png

Mkto_Zscaler_Logo.png

Mkto_Cribl_Logo.png

Mkto_Yubico_Logo.png

Mkto_Forcepoint_Logo.png


Mkto_RunZero_Logo.png

Mkto_Armorcode_Logo.png

Mkto_Sophos_Logo.png

Mkto_Abstract_Security_Logo.png

Mkto_FireMon_Logo.png

Mkto_Island_Logo.png

Mkto_Cyberhaven_Logo.png

Mkto_Mimecast_Logo.png

Mkto_Immersive_Labs_V2_Logo.png

Mkto_ForeScout_Logo.png

Mkto_Okta_Logo.png

Mkto_Gigamon_Logo.png

Mkto_Horizon3_ai_Logo.png

Mkto_SentinelOne_Logo.png

Lorem ipsum dolor sit, amet consectetur adipisicing elit. Repudiandae, natus quos, debitis aspernatur adipisci voluptatibus non? Sequi ab molestias veniam fugiat placeat praesentium quidem natus cumque omnis, non saepe optio!

ABOUT US

GuidePoint Security provides trusted cybersecurity expertise, solutions and services and help organizations make better decisions that minimize risk. By taking a three-tiered, holistic approach for evaluating security posture and ecosystems, GuidePoint enables some of the nation's top organizations, such as Fortune 500 companies and U.S government agencies, to identify threats, optimize resources and integrate best-fit solutions that mitigate risk.

Copyright © 2025 GuidePoint Security LLC. All rights reserved. 2025 Privacy Policy Terms of Service