The 14th Annual Michigan Cyber Summit brings together local and national thought leaders to help attendees stay ahead of the curve in preparing to defend, respond and recover from cyber threat actors. The State of Michigan has long been considered a national leader in cybersecurity, and this Summit facilitates conversations about leveraging generative AI in defense strategies, how federal resources can be part of your preparedness and response plans, the latest advancements in protecting both public and private interests. In partnership with the DTMB, Government Technology brings together a wide breadth of thought leaders for lively discussions that will help keep Michigan on the forefront of cyber defense.
The 2025 Michigan Cyber Summit gives us the opportunity to connect with cybersecurity experts from across the globe on a variety of cybersecurity topics, including new and emerging technologies, pressing threats, and processes to better protect public and private sectors. The digital ecosystem is constantly changing, and we need to work together to better secure our data and strengthen Michigan’s cybersecurity posture. This event, now in its 14th year, promises to be the best summit yet.
- Laura Clark, Chief Information Officer, State of Michigan
We are excited to bring the Michigan Cyber Summit back to Novi for its 14th year. The event gives technology leaders from both the public and private sectors the opportunity to work together, discuss how to overcome common threats, and strategize about of the best way to collectively protect the people who live, work, play, and do business in our great state.- Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management & Budget
Thursday, October 23 |
|
8:00 am Eastern |
Registration and Morning Refreshments in the Exhibit Area |
9:00 am Eastern |
Welcome and Event Opening CeremoniesIncludes the National Anthem and the presentation of the colors by the Michigan State Police Color Guard. Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management and Budget |
9:10 am Eastern |
Keynote – Keep Your Head Out of the Cyber Sand: Using Superior Communications to Get the Job Done!Risk can take on many forms and governments must understand how to accept it, mitigate it, or insure against it while not sticking their head in the sand to ignore it. How will you assess your cyber risks and balance them against your needs? How will you make the rational decisions needed to be successful? How will you navigate the road to recovery? This session will answer these questions with a focus on ideas that will help you engage your leaders with real-world examples. Bryce Austin, CEO, TCE Strategy |
10:10 am Eastern |
What’s NextCaleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management and Budget |
10:15 am Eastern |
Networking Break in the Exhibit Area |
10:45 am Eastern |
Proceed to breakouts |
11:00 am Eastern |
Concurrent SessionsAgentic AI Meets Cyber Defense: The Next Frontier in SecurityAgentic AI—AI systems capable of autonomous decision-making—is redefining the cybersecurity landscape. This session explores how cutting-edge agentic AI is being used to detect, respond to, and even predict cyber threats in real time. Attendees will gain insight into the opportunities and risks of integrating agentic AI into defense strategies, including threat hunting, adaptive response, and autonomous mitigation. Join us to discover how this transformative technology is shaping the future of cyber defense—and how to stay ahead of the curve. Preparedness & Crisis Readiness in an AI-Driven Threat LandscapeAs AI accelerates the speed and sophistication of cyber threats, traditional defense models are no longer enough. This session explores how organizations can build true crisis readiness—anticipating advanced perceived threats before they strike. Learn how to adapt your cybersecurity strategy for an AI-enabled world, enhance threat perception, and strengthen decision-making under pressure. Designed for leaders and defenders alike, this session will equip you to stay ahead of emerging risks and respond with confidence. Cybersecurity Has an IT ProblemStrong cybersecurity begins with strong information technology. This session will explore the foundational relationship between cybersecurity and IT architecture, emphasizing that effective security cannot exist in isolation from well-managed, modern, and resilient IT systems. From asset inventory and network visibility to patch management and access controls, cybersecurity outcomes are only as strong as the IT environments in which they operate. Public sector organizations often struggle with legacy infrastructure, fragmented systems, and under-resourced IT teams—all of which create systemic vulnerabilities. The People Problem + Social EngineeringSocial engineering in 2025 is turbocharged by AI-powered deception techniques that exploit human psychology with unprecedented precision. This session uncovers how attackers use advanced AI tools to craft personalized, convincing attacks—and how understanding human behavior can turn the tide in your defense. Through real-world examples and innovative strategies, attendees will learn how to detect, disrupt, and defend against next-generation social engineering threat Optimizing Cybersecurity Operations in Tight Budget CyclesIn a time of rising demands and fixed budgets, public sector leaders are being challenged to do more—with less. How can organizations prioritize cybersecurity effectively, drive efficiency, and still deliver meaningful results? This session explores how to identify and make the most of available resources by streamlining operations, optimizing existing tools, and fostering cross-functional collaboration and sharing services. Expect real-world insights around high-impact priorities and selecting the right people, tools, technologies, and services to move forward. |
12:00 pm Eastern |
Transition to Lunch |
12:15 pm Eastern |
Lunch Buffet |
1:00 pm Eastern |
General Session |
2:00 pm Eastern |
Networking Break in the Exhibit Area |
2:30 pm Eastern |
Proceed to breakouts |
2:45 pm Eastern |
Concurrent SessionsAI vs. AI: Defending Against Malicious Autonomous AgentsAs malicious autonomous AI agents emerge as new cyber threats, defending against AI-driven attacks requires advanced countermeasures powered by AI itself. This session examines the evolving battle between AI attackers and defenders, highlighting techniques for detecting, mitigating, and neutralizing hostile autonomous agents. Attendees will learn about cutting-edge AI defense strategies and the challenges of securing systems in an AI-versus-AI landscape. Collaborative Cyber Crisis ManagementWhen a cyber incident strikes, a fragmented response can cause delays and confusion. This session highlights the need for a unified crisis management strategy that brings together IT, security, legal, and communications teams. Through expert insights and real-world examples, attendees will learn how to break down silos, strengthen collaboration, and build a resilient response plan that ensures fast, coordinated action in any cyber crisis. Skills for the World of AI DefenseAs cyber threats evolve in complexity, so must the skill sets of IT and security professionals. This session explores the critical IT skills needed to build effective cybersecurity defenses in 2025—from cloud-native security and automation to threat hunting, AI-driven analysis, and secure DevOps practices. Attendees will gain insight into emerging roles, must-have competencies, and how to future-proof their teams in a rapidly shifting threat landscape. Defending Critical Infrastructure: Best Practices for OT SecurityThis presentation will focus on the evolving cybersecurity threats targeting operational technology (OT) environments within critical infrastructure sectors. Drawing on real-world attack scenarios and lessons learned from high-profile incidents impacting energy, water, transportation, and other essential services, the session will highlight emerging adversary tactics and common vulnerabilities in OT systems. Attendees will gain actionable best practices to strengthen defenses, enhance visibility and monitoring, and build resilience against disruptive cyberattacks. A People Problem: Internet and Mobile SafetyAs organizations increasingly rely on mobile connectivity and online platforms, safeguarding digital interactions becomes more critical than ever. How can teams ensure secure browsing, data protection, and mobile device hygiene across their workforce? This session will unpack practical strategies for minimizing risks in internet and mobile usage, promoting security-first habits, and empowering employees with the awareness needed to protect sensitive information and uphold public trust. |
3:45 pm Eastern |
Transition to Closing Session |
4:00 pm Eastern |
Closing Session |
5:00 pm Eastern |
Networking Reception in the Exhibit AreaNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
5:30 pm Eastern |
End of ConferenceConference times, agenda, and speakers are subject to change. |
46100 Grand River Ave.
Novi, MI 48374
(248) 348-5600
Judy Asher
President
Michigan Council of Women in Technology
Daniel Ayala
Managing Partner
Secratic LLC
Jim Beechey
Executive Director - Security
CMS Energy
Jamie Bennett
Deputy Chief Security Officer
Department of Technology, Management & Budget
State of Michigan
Ralph Bolen
Director of Information Secuirty
MotorCity Casino Hotel
Caleb Buhs
Chief Deputy Director
Department of Technology, Management & Budget
State of Michigan
Jayson Cavendish
Director of Performance Management
Department of Technology, Management & Budget
State of Michigan
Laura Clark
Chief Information Officer
Department of Technology, Management & Budget
State of Michigan
Jim Coggin
IT Director/Business Relationship Manager
Department of Technology, Management & Budget
State of Michigan
Betsy Freeman
CEO, Radius Advisory Group
President, Synergist Mobility Acceleration
Synergist Mobility Acceleration
Heather Frick
Agency Services Director
Department of Technology, Management & Budget
State of Michigan
Tiziana Galeazzi
General Manager (AG, GOV, LEO, MDOT)
Department of Technology, Management & Budget
State of Michigan
Steven Herrin
Director, Information Protection and Security
DTE Energy
Jeff Hoffman
Detective Lieutenant
Michigan State Police; Michigan Cyber Command Center
State of Michigan
Charles Hoffmeyer
IT/IR Specialist
MI Cyber Command Center
Jamie Howell
Enterprise Portfolio Management Director
Department of Technology, Management & Budget
State of Michigan
Stephanie Jeppesen
State Administrative Manager, Business Services Unit, Cybersecurity and Infrastructure Protection
Department of Technology, Management & Budget
State of Michigan
Matt June
Chief Information Officer
Peckham INC
Michelle McClish
Cybersecurity Local Partnerships
Department of Technology, Management & Budget
State of Michigan
Joseph McNerney
Major - Commander
USAF ANG 272 COS
Michigan Air National Guard 272 Command
Rex Menold
Chief Technology Officer
Department of Technology, Management & Budget
State of Michigan
Brian Pillar
IT Protect Deliery Officer
Department of Technology, Management & Budget
State of Michigan
Karen Rasche
Regional Program Coordinator
Michigan Council of Women in Technology
Andrew Sczgielski
Supervisory Special Agent
Cyber Criminal Squad, CY-16
FBI Detroit Cyber Task Force
Kayla Simon
Departmental & Communications Analyst
Department of Technology, Management & Budget
State of Michigan
Eric Swanson
Director CSS
Department of Technology, Management & Budget
State of Michigan
Sarah Tennant
Senior Sector Development Director & Cyber Advisory
Michigan Economic Develompent Corporation
MI Economic Development Corporation
Elyse Walter
Communications and Outreach Manager
Michigan Department of Labor and Economic Opportunity
Laura Wotruba
Communications Director
Department of Technology, Management & Budget
State of Michigan
Greg Bruggen
Principal Technology Sales Leader
IBM
Tammie Buehler
Client Director
Trace3
Kerry DeBano
Client Relationship Executive
Deloitte
James Keenan
Security Lead
SLED
Google
Greg Kreiling
Major Account Manager
Fortinet
Miguel Mickey
Account Executive
Microsoft
Kyle O'Neill
Senior Account Executive
Amazon Web Services
James Reilly
Major Account Manager
Trend Micro
Registration is open to professionals from the public, private and nonprofit sectors.
This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.
Registration Fees:
Local Government & nonprofit: $80
State of Michigan Employees: Free
College Students: $50*
*Students must register with school-issued email for verification
Private Sector & Business Professionals: $95
Need help registering, or have general event questions? Contact:
Jennifer Caldwell
Government Technology
A division of e.Republic
Phone: (916) 932-1345
E-mail: jcaldwell@erepublic.com
Already a sponsor, but need a hand? Reach out to:
Mireya Gaton
Government Technology
A Division of e.Republic
Phone: (916) 296-2617
E-mail: mgaton@erepublic.com
Want to sponsor and stand out? Reach out to explore opportunities!
Heather Earney
Government Technology
A Division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com