The Alabama Public Sector Cybersecurity Summit is where government defends the future.
This public sector-focused event brings together IT security leaders, risk managers, and public officials to tackle the evolving cyber threats facing state and local government. Through expert-led sessions, peer exchange, and real-world case studies, attendees gain practical strategies to strengthen cyber resilience, protect critical infrastructure, and lead with confidence in an age of constant risk. Designed specifically for the public sector, this summit delivers insights you can act on and alliances you can trust!
After working closely with GovTech over the past ten years to host Alabama’s annual Digital Government Summit, the Office of Information Technology looks forward to expanding our partnership as we prepare for the State’s inaugural Public Sector Cybersecurity Summit. We are excited for this opportunity to bring together IT leaders and security professionals from across Alabama’s public sector to hear from an impressive lineup of nationally recognized cyber experts, as well as to network, collaborate, and learn from one another. We look forward to having you join us at the 2026 Cyber Summit in Montgomery this June!
- Daniel Urquhart, Secretary of Information Technology, Chief Information Officer, State of Alabama
As security leaders, we know that cyber threats are no longer hypothetical; they are persistent, increasingly sophisticated, and growing ever more common. Public sector security professionals must shoulder a seemingly endless range of responsibilities to ensure that our systems and data are as safe and secure as possible. Events like the Alabama Public Sector Cybersecurity Summit are invaluable because they equip security teams with practical knowledge, effective tools, and proven strategies that aid in the prevention of, response to, and recovery from cyber incidents. I hope you will make plans to attend!
- Chad Smith, Chief Information Security Officer, State of Alabama
Thursday, June 4 |
|
8:00 am Central |
Registration and Morning Refreshments in the Exhibit Area |
9:00 am Central |
Opening RemarksDaniel Urquhart, Secretary of Information Technology, Chief Information Officer, State of Alabama |
9:15 am Central |
Cybersecurity State of the StateThis session provides a comprehensive update on Alabama’s current cybersecurity posture, top risks, and key initiatives, including progress and lessons learned from recent incidents. Attendees will gain an Alabama-specific view of evolving threats, available resources, and priority actions shaping the state’s response. Emphasizing a whole-of-state approach, the session highlights why cybersecurity extends beyond any single agency and features real-world examples that illustrate today’s risk landscape and the path forward to strengthen Alabama’s digital resilience. Chad Smith, Chief Information Security Officer, Office of Information Technology, State of Alabama |
9:45 am Central |
Keynote – Cyberchat Q&A: Insights for Elevating Cyber Resilience in Your OrganizationOnce adversaries in the cybersphere, Hector Monsegur and Chris Tarbell have joined forces to help organizations confront today’s most pressing cyber threats. Drawing on their extraordinary experiences - one as a former black-hat hacker, the other as an FBI special agent - their conversation offers a rare, dual-lens view of the modern threat landscape. In a dynamic, audience-driven discussion, Monsegur and Tarbell break down the most significant risks facing organizations today, how real-world attacks unfold, and where defenses most often fail. Together, they share practical insights and actionable frameworks that leaders can apply to strengthen security, reduce risk, and protect operations from disruptions that can cripple organizations and erode trust. Chris Tarbell, Director, Cyber Security and Investigations, Berkley Research Group and Former FBI Special Agent Hector Monsegur, Cyber Security Expert and Co-founder, SafeHill |
10:45 am Central |
Networking Break in the Exhibit Area |
11:15 am Central |
Concurrent SessionsIncident Response Planning – Ready, Set, Respond! (The VIRTEx Tabletop Experience)Security is a team sport and communication is usually the first thing to break. Watch and learn as experts from EMA, ALEA, and OIT navigate a high-stakes, simulated cyber-attack in real-time. This interactive tabletop exercise offers a "behind the curtain" look at how state and local agencies coordinate, giving you a blueprint for how to coach your own team through a crisis. Session Leader: Frank Yarnell, Director, Information Security, Office of Information Technology, State of Alabama Adam Rose, Chief Information Security Officer, Law Enforcement Agency (ALEA), State of Alabama Governance That Works: Turning Frameworks into ActionGet the "inside baseball" on cybersecurity legislation from the McCrary Institute, followed by an expert panel discussion on how organizations can effectively adopt and implement frameworks to manage risk, ensure compliance, and strengthen security posture. Walk away with practical insights on aligning with evolving standards and turning governance into actionable, enterprise-wide impact. Nick Sellers, Associate Director and COO, McCrary Institute for Cyber and Critical Infrastructure Security, Auburn University Emerging Tech and Security: The Speed of ChangeInnovation moves fast, but attackers often move faster. As technologies like OpenClaw reshape the landscape, our traditional security playbooks are becoming obsolete overnight. This session explores how to maintain a resilient security posture when the "underlying tech" is shifting beneath your feet, providing strategies for agile defense in an era of rapid-fire releases. |
12:15 pm Central |
Lunch |
1:00 pm Central |
General Session – Cyber Reinforcements: Tools, Funding, and Strategies for SuccessStrengthen your organization’s cybersecurity posture in this practical, success-driven session! Hear from Auburn University’s McCrary Institute and a municipality that leveraged available resources and SLCGP funding to significantly improve their cyber posture. Attendees will also receive an update on current Security Operations Center (SOC) capabilities and future roadmap, along with clear guidance on what funding and support are available to local governments. James Fuller, Chief Information Officer, City of Calera Craig Whittinghill, Deputy Director for Applied Research and Services, McCrary Institute for Cyber and Critical Infrastructure Security, Auburn University |
1:00 pm Central |
Concurrent Lab Experience I – Live Threat HuntingStep into a simulated attack environment and experience a real-world cyber incident as it unfolds. In this hands-on workshop, participants will use a hosted threat environment to identify, investigate, and respond to live threats – gaining practical skills they can apply immediately within their own organizations. Open to all experience levels, attendees are encouraged to bring their laptops to fully participate in the exercises. Please note: Capacity is limited. The lab will be offered in three separate one-hour sessions while the General Session continues in the Main Ballroom. Sign-up sheets will be available onsite the day of the event. |
1:30 pm Central |
General Session – Identity is the New PerimeterForget the firewall – your credentials are the front line. Join lead architects from featured partners as they deconstruct how a single compromised "toehold" allows attackers to move laterally across your entire cloud ecosystem. Learn why identity is the primary target of modern breaches and how to build a defense that assumes the perimeter has already been infiltrated. |
2:00 pm Central |
Networking Break in the Exhibit Area |
2:15 pm Central |
Concurrent Lab Experience II – Live Threat HuntingStep into a simulated attack environment and experience a real-world cyber incident as it unfolds. In this hands-on workshop, participants will use a hosted threat environment to identify, investigate, and respond to live threats – gaining practical skills they can apply immediately within their own organizations. Open to all experience levels, attendees are encouraged to bring their laptops to fully participate in the exercises. Please note: Capacity is limited. The lab will be offered in three separate one-hour sessions while the General Session continues in the Main Ballroom. Sign-up sheets will be available onsite the day of the event. |
2:30 pm Central |
General Session – From the Frontlines: A CISA Update for AlabamaGet the latest updates from CISA on its evolving role, priorities, and support for state and local partners. Learn what lies ahead and how Alabama organizations can better leverage federal resources to strengthen cybersecurity readiness and resilience. |
3:30 pm Central |
General Session – Securing AI in Production EnvironmentsAs agencies deploy AI platforms into production environments, security and governance must keep pace. This session explores real-world examples of how to secure enterprise AI deployments, including access controls, data protection, monitoring, and risk management strategies that support innovation without compromising security. |
3:30 pm Central |
Concurrent Lab Experience III – Live Threat HuntingStep into a simulated attack environment and experience a real-world cyber incident as it unfolds. In this hands-on workshop, participants will use a hosted threat environment to identify, investigate, and respond to live threats – gaining practical skills they can apply immediately within their own organizations. Open to all experience levels, attendees are encouraged to bring their laptops to fully participate in the exercises. Please note: Capacity is limited. The lab will be offered in three separate one-hour sessions while the General Session continues in the Main Ballroom. Sign-up sheets will be available onsite the day of the event. |
4:00 pm Central |
Closing Session – The Expanding Threat LandscapeFrom ransomware and IoT vulnerabilities to third-party risk and the dark web, public-sector threat vectors are rapidly evolving in complexity and scale. This session examines current threat streams and trends targeting government services, businesses, and individual victims in Alabama. Participants will leave with a clearer understanding of adversary behavior and defensive gaps — and practical reinforcement for the importance of implementing layered defense strategies to reduce individual and organizational risk. Supervisory Special Agent, Mobile Division, Cyber Squad, Federal Bureau of Investigation |
4:30 pm Central |
Networking Reception in the Exhibit AreaNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
5:00 pm Central |
End of ConferenceConference times, agenda, and speakers are subject to change. |
300 Tallapoosa Street
Montgomery, AL 36104
334-269-5055
Open to Public Sector only.
Registration - Free
If you represent a Private Sector organization and are interested in Sponsorship Opportunities, please contact Heather Earney.
This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.
Need help registering, or have general event questions? Contact:
Raquel Figueira
Government Technology
A division of e.Republic
Phone: (916) 932-1341
E-mail: rfigueira@erepublic.com
Already a sponsor, but need a hand? Reach out to:
Mireya Gaton
Government Technology
A division of e.Republic
Phone:(916) 296-2617
E-Mail: mgaton@erepublic.com
Want to sponsor and stand out? Reach out to explore opportunities!
Heather Earney
Government Technology
A division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com