The Flagship of Cybersecurity

CruiseCon

Visionaries

Shawn Harris
Chipotle Mexican Grill

Shawn Harris

Deputy CISO

Chipotle Mexican Grill

About Me

Founded in 1993, Chipotle Mexican Grill is an American chain of fast casual restaurants in the United States, United Kingdom, Canada, Germany, and France, that offers tacos, burritos, salads and burrito bowls. The company is headquartered in Newport Beach, California.

EVENT DETAILS

October 2-6, 2025

1:00 PM-4:00 PM
Check In
4:00 PM-6:00 PM
Welcome Reception
Panelists
Robert Failla Royal Caribbean Group

Speaker

Robert Failla

AVP, Governance, Risk & Compliance

Royal Caribbean Group

4:00 PM-6:00 PM
Deputy CISO Ask Me Anything Panel.
Panelists
8:30 AM-8:40 AM
Event Welcome
8:40 AM-9:25 AM
Keynote
Keynote After 100 Cybersecurity Assessments, What's Working/What's Not

After now doing (actually over) 100 cybersecurity assessments for governments, critical infrastructure, companies, and organizations of all sizes, Mr. Bigman has found some under-appreciated techniques, tricks, and configuration settings that really do work in minimizing cybersecurity risk. There are also (some surprising) things that almost all cybersecurity programs are doing that do little to stop the bad guys and absorb critical time and effort. This presentation will describe which cybersecurity activities Mr. Bigman believes you should prioritize and which ones you should deemphasize. Be prepared for some controversial ideas.

Panelists
Robert Bigman 2BSecure, Inc

Speaker

Robert Bigman

Former CISO, Central Intelligence Agency & President

2BSecure, Inc

8:50 AM-8:30 AM
Networking
9:25 AM-10:10 AM
Quantum Security

As Quantum technology advances, today’s classical cryptographic systems face potential threat and compromise. While efforts may be discussed on how to avert this catastrophe, it can only be managed through reasonable, timely and proactive preparation. How should CISOs begin to prepare? What priority should be given to starting Quantum Resistance/Resilience projects over the next few years? How should these projects be funded and prioritized with other pressing day-to-day operational security challenges?

Panelists
Debbie Taylor Moore Quantum Crunch

Speaker

Debbie Taylor Moore

Co-Founder & CEO

Quantum Crunch

10:10 AM-10:30 AM
Networking Break
10:30 AM-11:15 AM
The Leadership Gap: Why Cybersecurity’s Biggest Threat is Calling From Inside the House

The cybersecurity industry is facing a silent epidemic: underdeveloped leadership. As the field grows, highly skilled technicians are often thrust into leadership roles before they’re ready and without the tools to succeed. This weakens team morale and organizational health and can introduce security vulnerabilities, the very risks we work to mitigate. In this talk, Chris Cochran will share candid leadership stories—some disastrous, some triumphant-along with the philosophies and battle-tested tactics that have helped him navigate the toughest leadership challenges. Whether you are grooming new leaders or handling a leadership challenge yourself, this session will equip you with practical strategies to lead confidently, build strong teams, and drive success in cybersecurity.

Panelists
Chris Cochran SANS Institute

Speaker

Chris Cochran

Senior Advisor

SANS Institute

11:15 AM-1:00 PM
Lunch
1:15 PM-2:00 PM
Making Your Cybersecurity Program a Profit Center

Turning Defense into Dollars, Dan Meacham presents a compelling framework for transforming your cybersecurity program into a strategic profit center. Drawing from real-world implementations and lessons learned at Legendary Entertainment, Dan will share how brand enforcement security initiatives can drive measurable business value, strengthen the IP posture, and generate some revenue.

Panelists
Dan Meacham Legendary Entertainment

Speaker

Dan Meacham

CSO, CISO

Legendary Entertainment

2:00 PM-2:15 PM
Networking Break
2:15 PM-3:00 PM
An APT's Overview of APTs

In leading a team of Nation-State hackers, Omer Horev was the nemesis of hostile governments and terrorists around the world. In order to be the best, he had to understand and channel his adversaries. He was forced to stay abreast of the offensive and defensive capabilities of the enemy to be able to effectively penetrate their defenses, go undetected and accomplish his objectives. In this unique presentation, Omer details the capabilities and methods of the prominent APTs and terrorist organizations, and gives insights into how to prevent, detect, and repel their attacks.

Panelists
Omer Horev Stealth Mode

Speaker

Omer Horev

CEO

Stealth Mode

3:00 PM-3:20 PM
Networking Break
3:20 PM-4:05 PM
Project Management for CISOs

Admittedly the topic name seems boring, but this might be the most valuable topic of the event. Ira specifically asked Tracy to deliver this presentation given his experience in some of the largest cybersecurity programs in the world. The most effective cybersecurity programs have project managers integrated into all major efforts, PMs help ensure a repeatable process into all efforts. Good project managers provide metrics allowing a CISO to know the status of all critical projects. While it would be great for all programs to have a team of PMs, the reality is that most programs will not have that level of resources available. For that reasons, Dr Celaya-Brown will be covering the elements of good project management practices, and provide guidance on to how to incorporate good practices into programs even with limited resources.

Panelists
Tracy Celaya Stream Data Centers

Speaker

Tracy Brown Celaya

Chief of Staff

Stream Data Centers

4:05 PM-4:45 PM
Networking Session
7:30 PM-9:00 PM
Dinner
7:30 AM-5:00 PM
SHORE EXCURSIONS + NETWORKING EVENTS

Group shore excursions will be organized and announced in the coming week.

8:00 AM-8:30 AM
Networking
8:30 AM-8:40 AM
Welcome
8:40 AM-9:25 AM
Agentic AI

In 2025, AI agents are quickly evolving into an important aspect of enterprise operations, enhancing tasks from customer service to complex problem-solving. However, they also introduce significant security challenges. Key issues include vulnerabilities in AI architecture, data manipulation, tool exploitation, and Non-Human Identity abuse. The threats are real and can result in data breaches, resource consumption, and agent hijacking.

Panelists
Timothy Youngblood Astrix Security

Speaker

Timothy Youngblood

CISO in Residence

Astrix Security

9:25 AM-10:10 AM
Days of Future Past: The Impacts of AI on You, Cybersecurity, and Your Organization
10:10 AM-10:30 AM
Networking Break
10:30 AM-11:15 AM
State of Cloud Security
Panelists
John Yeoh Cloud Security Alliance

Speaker

John Yeoh

Global VP of Research

Cloud Security Alliance

11:15 AM-1:00 PM
Lunch
1:15 PM-2:00 PM
Mastering Personal Branding

In an era where personal branding can significantly impact professional opportunities and perceptions, Chief Information Security Officers (CISOs) must navigate how to effectively establish and grow their personal brands. This talk, presented by a CISO renowned for their extensive industry contributions through podcasts, articles, and online courses, explores strategic approaches to personal branding tailored for cybersecurity leaders. It will dive into creating a compelling personal narrative that resonates with both industry peers and the broader business community. The session will offer practical advice on integrating personal branding with professional responsibilities to enhance visibility, influence, and leadership within the cybersecurity industry. Attendees will leave with actionable insights on using personal branding as a tool for career advancement and thought leadership in the evolving landscape of cyber security.

Panelists
Jerich Beason WM

Speaker

Jerich Beason

CISO

WM

2:00 PM-2:15 PM
Networking Break
2:15 PM-3:00 PM
Deep Fake Detection

The convergence of advanced AI technologies and social engineering tactics has introduced sophisticated threats leveraging deepfakes and synthetic media. These malicious tools manipulate trust, compromise security, and exploit vulnerabilities within organizations. By utilizing realistic synthetic voices, manipulated videos, and fake credentials, cybercriminals deceive individuals, bypass authentication systems, and undermine organizational integrity. Understanding the mechanics of these attacks, their potential impacts, and the strategies to detect and mitigate them is critical for maintaining security. Insights into real-world examples and forward-looking solutions provide the foundation for safeguarding organizations against these increasingly convincing synthetic deceptions. Learning Objectives:

Identify and Analyze Synthetic Media Threats

Evaluate the Impact of Synthetic Media on Insider Threats

Implement Defensive Measures to Combat Deepfakes

Panelists
James McQuiggan KnowBe4

Speaker

James McQuiggan

Security Awareness Advocate

KnowBe4

3:00 PM-3:20 PM
Networking Session
5:00 PM-6:00 PM
Closing Reception
7:00 PM-8:00 PM
Dinner
8:00 AM-3:00 PM
Departure

Together With