Cyber Security Conference - speakers photos

Cyber Security Conference

Check back for information on the 2018 Cyber Security Conference

Cyber Security Conference
View program brochure
For more information:


April 28, 2017

COX Convention Center, Oklahoma City, Oklahoma
Pre-conference – 8-9 a.m. / Conference – 9:15 a.m.-4 p.m.

Featuring local and national experts on cyber security – one of the hot topics of 2017 in business.

With the increasing risk and sophistication of cyber attacks, there is a continuous need to adapt your business strategy to protect sensitive business and personal information. This inaugural Cyber Security Conference brings national and international experts to the state and is sponsored by the Management Science and Information Systems Department and the Center for Executive and Professional Development, Spears School of Business, Oklahoma State University.

a man touching a security lock icon.

Benefits to the participant

Learn from the experts and take advantage of questions and answers and networking to develop new ideas and get the information you need to address cyber security including how to:

  • understand the risks your organization faces
  • define the nature and motivation of different threats—fraud, theft,
  • extortion, national security, terrorism
  • develop a cyber security strategy for your business.

Pre-conference: Cyber Security Table Topic Discussions and Networking Breakfast
This pre-conference session will be hosting roundtable conversations on 10 cyber security topics. Discussions are meant to be open and candid exchanges where participants can ask questions and share experiences. Facilitators will guide discussions by presenting targeted issues and topics related to cyber security issues. During the session participants are invited to all table topics of interest. A breakfast buffet will also be available, and participants are encouraged to network with other pre-conference attendees and facilitators

Sponsorship Information

Platinum Sponsor – $10,000

Includes being a premier sponsor of the pre-conference, morning break sponsorship, 10 registrations to the Cyber Security Conference, reserved table of 10 at lunch, 10 registrations to the Table Topics pre-conference, four invitations to a sponsor and speaker dinner on April 27 in Oklahoma City, an exhibit booth at the conference, logo and name listed on conference website, e-mail promotion, and a link from the conference website to sponsor’s corporate website and prominent recognition in promotion and materials at the conference.
(Deductible- $7,000; Non-deductible- $3,000)

Gold Sponsor – $3,500

Includes 8 registrations to the Cyber Security Conference, reserved table of 8 at lunch, and 8 tickets to the Cyber Security Conference Table Topics pre-conference, two invitations to a sponsor and speaker dinner on April 27 in Oklahoma City, an exhibit booth at the conference, logo and name listed on conference website, e-mail promotion, and a link from the conference website to sponsor’s corporate website, and prominent recognition in promotion and materials at the conference. (Deductible- $1,090; Non-deductible- $2,410)

Silver Sponsor – $2,000

Includes 4 registrations to the Cyber Security Conference, 4 tickets to the Cyber Security Conference Table Topics pre-conference, reserved seating for 4 at the luncheon, an exhibit booth at the conference, and logo and name listed on conference website, e-mail promotion, a link from the conference website to sponsor’s corporate website, and prominent recognition in promotion and materials at the conference. (Deductible- $500; Non-deductible- $1,500)

2017 Sponsors

Gold Sponsor

Dolese logo Cox Dolese logo Dolese OGE logo OGE
Stinnett and Associates logo Stinnett and Associates AF logo AF

Silver Sponsor

KOSU logo KOSU National Litigation Law Group, PLLC logo National Litigation Law Group, PLLC OneNet logo OneNet Sonic logo Sonic
Zscaler logo Zscaler

AppSec Pipeline – Application Security in an Agile Development, DevOps and Continuous Integration/Delivery/Change World
Doug Morato, Director of Application Security, TradeStation Group, Boca Raton, FL
In this session, we will discuss the integration of Application Security in an Agile Development, DevOps and Continuous Integration/Delivery/Change world, and how we can keep up with the fast pace.

Nine Years into Mobility, Has Security Caught Up?
Georgia Weidman, Founder and Chief Technology Officer, Shevirah, Inc., Ashburn, VA
Over the past nine years, mobility disrupted the Corporate Enterprise in a manner on the magnitude that PCs disrupted mini-computers and mainframes in the 1990s. Yet most corporations continue to approach security as if there is still a hard perimeter, corporate-owned end points, and internal corporate applications. But Mobility equals employee-owned endpoints, connecting over public carrier networks, to cloud-based applications. How does perimeter security address this?

The Concern of Ransomware and Other Threat Actors
Daniel Ford, Forensic Analyst and Security Engineer, Rook Security, Indianapolis, IN
In 2016, Ransomware ran wild and many were not prepared to handle the fallout after being infected. And while people were busy trying to prepare for Ransomware attacks, what else did they miss that could have been avoided?

Cyber Convergence 2025, NOW!
Nikk Gilbert, Director, Global Information Protection and Assurance, ConocoPhillips, Bartlesville, OK
Businesses are swiftly adopting a cloud first methodology. Security must adapt to this new reality by converging traditional security infrastructure with emerging cloud technologies. Explore the possibilities of reducing complexity, enhancing security while supporting the customer and business.

Panel: Cyber Security Considerations for Your Business and Incident Response
Ken Harmon, Chief Information Security Officer, KOCH Industries, Inc., Wichita, KS
Mark Davis, Vice President of Cyber Security and Enterprise Systems, Sonic Drive-In, Inc., Oklahoma City, OK
Lydia Hixon, , Love’s Travel Stops and Country Stores, Oklahoma City, OK
This panel session will discuss what action plan your company should have in place should a cyber-attack become a reality, and how to communicate preparedness plans and risk factors with your administration.

Rick Wilson, Ph.D.Rick Wilson, Ph.D., has been a faculty member in OSU’s Spears School of Business for 25 years, presently serving as Chair of the Management Science and Information Systems Department. Prior to earning his Ph.D. from the University of Nebraska-Lincoln, Dr. Wilson worked for a number of years in industry as an IT professional in the telecommunications industry. He is most well-known in academia for his research in the data sciences, including sports analytics, and has won over a dozen teaching and leadership awards throughout his career.

Doug MoratoDoug Morato is an Application Security professional, with over 8 years of InfoSec experience, on roles that include Security Architect, Penetration Tester, Software Security Consultant. Overall, Doug has 13 years of IT Generalist experience. Currently, Doug is the Director of Application Security at TradeStation. In the past, he has worked for PwC, HP, MasterCard and Disney. On his free time, he devotes time to his passions, his family, travel, shredding mountain bike trails and AppSec, as a core contributor to the OWASP WebGoat Project.

Georgia WeidmanGeorgia Weidman is the Founder and CTO of Shevirah Inc. She is a penetration tester, security researcher, speaker, trainer, and author. Ms. Weidman holds a MS in computer science as well as CISSP, CEH, and OSCP certifications. Her work in mobile exploitation has been featured internationally in print and on television. She has presented and trained at venues such as the NSA, West Point, and Black Hat. Her DARPA Cyber Fast Track grant resulted in the release of the Smartphone Pentest Framework (SPF). She founded Shevirah Inc. to commercialize SPF for enterprise customers and is a graduate of the Mach37 accelerator. Georgia is the author of Penetration Testing: A Hands-On Introduction to Hacking ( from No Starch Press. She was the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.

Daniel FordDaniel Ford is a Forensic Analyst and Security Engineer at Rook Security. He graduated from Purdue University with a degree in Electrical and Computer Engineering Technology. He interned with Rook for two years before becoming full time. In those two years, he developed hacking hardware tools that give a unique experience for the client and Rook when on a penetration test. He has his obtained the GMOB certification, which gives him unique knowledge on mobile devices and how to secure them in a business environment. While working at Rook, Dan has been on many high profile Forensic and Incident Response cases.

Nikk GilbertNikk Gilbert With 19 years of executive level experience in Information technology roles, Nikk Gilbert is a respected technology leader within the government & private sectors. His experience includes working as an information security executive & information technology leader for large multinational organizations such as the American Department of Defense, NATO, Alstom, ConocoPhillips and the U.S. Navy where he was awarded the Meritorious Civilian Service Medal. Nikk is a Distinguished Fellow of the Ponemon Institute, sits on the Board of Directors for the ONG-ISAC and has been a keynote speaker at technology events throughout the world.

Ken HarmonKen Harmon is the Chief Information Security Officer for Koch Industries, Inc., located in Wichita, Kansas. In this role, he works with business and IT leaders to help ensure that information security measures applied across Koch appropriately address the risks facing Koch companies today. Ken has been an employee with Koch since 1995 and has served in a variety of IT leadership roles with business units in multiple industries, including Oil and Gas, Fibers, Agriculture and others. Prior to his current role, Ken was the Sr. Vice President of Enterprise Technology Solutions, Koch’s IT shared services organization. He holds an Information Systems degree from Emporia State University and is a Certified Information Systems Security Professional (CISSP).

Mark DavisMark Davis is vice president of cyber security and enterprise systems for the Oklahoma City-based national headquarters of SONIC®, America’s Drive-In®. His responsibilities include leading the information security, data center operations and enterprise networking for the brand, along with the support of all corporate and field based client systems. Prior to SONIC, Davis’ experience includes information technology development, infrastructure management, and medical research for public, private and nonprofit organizations. Davis graduated from LeTourneau University in Longview, Texas with a bachelor of science in computer science and engineering technology. He is actively involved in the community as an elder, of Legacy Family Church and works on various orphan initiatives such as Orphan Sunday, a work of the Christian Alliance for Orphans. In addition, he has served on the board of directors for the Limbs for Life Foundation.

Lydia HixonLydia Hixon has been working in the Information Security field for over 16 years. She is a Certified Information Security Manager, Certified Information Security Auditor, and has 2 PCI Security Standards Council certifications. Throughout her career, she has focused on information security strategy and operations, business continuity, disaster recovery, and incident response. She holds a Bachelor’s degree from Oklahoma State University.

Jim Burkman, Ph.D.Jim Burkman holds a Ph.D. in Management Information Systems from Indiana University and is currently a Clinical Associate Professor at Oklahoma State University. He teaches Information Assurance courses that are key to OSU earning the distinction of being a National Center of Academic Excellence in IA Education (CAE/IAE and CAE/R). Jim is the program coordinator for the Master of Science in Information Assurance degree and teaches applied and theory courses in information assurance, digital forensics, and database. Dr. Burkman is also the founder and faculty advisor for the OSU Information Security and Assurance Club (ISAC). This student-driven club competes annually in the National Collegiate Cyber Defense Competition. His research focuses on the social psychology aspects of technology, to include issues of trust and expectations in the areas of secure computing and technology adoption. Additionally, Dr. Burkman studies the use of metaphors in the visual representations of complex data sets. His works have been published in various journals and conferences.

Mark WeiserMark Weiser, Regents Service Professor; Director, Center for Telecommunications and Network Security, Management Science and Information System

  • The conference is designed for senior-level leaders, human resource and information technology management and professionals, operational technology specialists, systems and data administrators, and other business leaders involved in the decision-making process for cyber security strategy, implementation, and management.
  • The conference will be beneficial to those in a range of industries including: legal practices, accounting firms, insurance brokers, personal information suppliers, wholesalers, public sector suppliers, schools, and colleges, and those involved in decision making on or delivery of cyber security in central government, local government, police and fire services, health services, and education.

  • Program format
    8am – 9am Pre-conference
    9am – 4pm Conference
  • CPE credits/CEU credits available
  • Location – COX Convention Center (Map), Oklahoma City, Oklahoma
  • Price:
    Pre-conference registration with table topics and networking breakfast (Conference Registration required to attend pre-conference) – $25 per person
    Cyber Security Conference only – $225 per person

    • Multiple registration discount (8 or more people)
      Cyber Security Conference only – $195 per person.
      Pre-conference registration with table topics and networking breakfast (Conference registration required to attend pre-conference) $25 per person
    • Conference Materials – Registration fee includes materials in electronic format, refreshments, and lunch. If you would prefer a hard copy of conference materials in a binder, please check the information below for an additional fee of $25 per binder.
  • Sponsorship Information:
    Sponsorship opportunities are available. Become a Sponsor.
  • Cancellation Policy:
    If a participant would like to cancel her/his registration less than 10 days prior to the conference, you are welcome to send a substitute. All guarantees have been submitted to the hotel, so refunds are not attainable. A refund is available given notification no later than 11 days prior to the conference. If you are transferring your registration to a colleague, please contact the OSU Center for Executive and Professional Development at 405-744-5208 or
  • For additional information or to sponsor:
    Sarah Williams, Program Coordinator, Center for Executive and Professional Development
    Oklahoma State University, 215 Business Building
    Stillwater, OK 74078-4011 USA
    Telephone: 405-744-5208